Customers sometimes need to plan product deployment and wait for internal documentation and policies to emerge in order to know what to configure.
Sometimes, Identity and Access Management can't wait! As we all know, threats and data breaches are all too common and quite often rely on weak authentication mechanisms to provide a point of entry to an organisation. You only have to look at articles describing how hackers got access through weakened administrator credentials or sign-on systems.
IBM Verify can be set up in such a way as to ensure you can get up and running quickly, with your existing systems. You don't have to rip-and-replace because our system won't talk to another. What we are proposing is that you continue as you are - but strengthen your authentication, adding features such as passwordless and strong authentication, to your existing systems.
So where you are using an on-premise directory for example, you can use Verify to strengthen password authentication by adding multi-factor. Verify can do this in a number of ways such as in-app, one-time passcode, biometrics and so on.
For a quick introduction to the concept of Identity Fabric, we suggest you look at this quick video introduction from our VP of Tech Sales, Bob Kalka, here.