1 to 10 of 19
Sort by

Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...

Vandana Verma Sehgal's profile image

Blog Entry
Identity and Access Management with IBM Security Verify

For decades IBM has been a key player in the Identity & Access Management (IAM) space, innovating on its solutions and adapting to new business challenges, compliance requirements and technologies. Throughout that evolution, IBM's IAM offerings have greatly evolved into a modern portfolio,...

Katherine Cola's profile image

Blog Entry
Get the Mobile Network Advantage when you Integrate ZenKey with IBM Security Verify

As a cloud native identity-as-a-service (IDaaS) solution, IBM Security Verify can continuously iterate to keep up with authentication standards, protocols, and trends in the market. Verify provides users wide authentication options like biometrics, QR codes or even FIDO2 hard tokens, along with...

Michael Keane's profile image

Blog Entry
We Have a Winner: KuppingerCole Puts IBM Identity Governance and Intelligence in All Three Leader Quadrants for 2020

That’s right. The results are in. IBM Identity Governance and Intelligence —soon to be part of the Verify family and branded IBM Verify Governance—has been ranked by KuppingerCole in the top quadrant of all three of their leadership categories in their 2020 report. The highlights include: ...

Deepak Kanwar's profile image

Blog Entry
Interested in joining the IBM Security Verify Access Early Access Program?

Are you interested in learning more about the new product features planned for upcoming releases of IBM Security Verify Access? Would you like the opportunity to try a Beta version of an upcoming IBM Security Verify Access release and the ability to give feedback regarding new product features?...

Ann-Louise BOLGER's profile image

Blog Entry
10.2.2020 - IBM Security Verify Features and Functionality Enhancements

Quickly download session data for adaptive access troubleshooting This enhancement enables the tenant admin to effectively interact with IBM support when dealing with Adaptive Access support tickets. The tenant admin can now download the entire Adaptive Access report as a json file,...

Jen Mulligan's profile image

Library Entry
Virtual Master Skills University 2020 — On-demand

All the deep, dive technical content from Virtual Master Skills University, held in September 2020, is now available to watch at your convenience on the IBM Security Learning Academy. Log in using your IBM ID, then choose the product track(s) of your choice. Content, including video lectures,...

Blog Entry
Gaining Deeper Identity Insights to Be Able to Make Better Access Decisions

Just because a user presents an accurate user name, password, IP and geolocation does not mean the user is legitimate. The harsh fact is that today's IAM systems are based on a time-worn — maybe worn out? — static approach to assessing risk. The static attributes traditionally used to identify...

DIANE BENJUYA's profile image

Blog Entry
Extend user attribute management in Verify for complex use cases with IBM Cloud Functions

It is very unlikely that user repositories, such as Active Directory or Security Directory Server, will contain all data associated with the user. It is also less likely that these directories have the data in the right format that applications expect. To normalize data in an IAM tool is a...

Adam Case's profile image