|
|
Partner details
 |
|
IBM
Wilhelm-Fay-Straße 30-32 • 65936 Frankfurt-Sossenheim Phone: +49 69 66 45 0 E-Mail: [email protected] Internet: http://www.ibm.com/
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. To learn more about IBM Security Systems, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/security
|
Sponsored events
-
Congress: European Identity & Cloud Conference 2015
05.05. - 08.05.2015
, Munich, Germany
-
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
-
Webinar: Access Governance for today’s agile, connected businesses
09.12.2014
, 4:00pm CET, 10:00am EST, 7:00am PST
-
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
-
Congress: European Identity & Cloud Conference 2014
13.05. - 16.05.2014
, Munich, Germany
-
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
-
Webinar: Minimizing Business Risks through Enterprise Single Sign-on
17.09.2009
, 16:00 CEST
-
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.
-
Congress: European Identity Conference 2009
05.05. - 08.05.2009
, Munich
-
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
-
Congress: 2nd European Identity Conference
22.04. - 25.04.2008
, Munich
-
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
-
Conference: 1st European Identity Conference
07.05. - 10.05.2007
, München
-
Compliance Trends & Identity Risk Management ? Identity Federation
User Centric Identity ? Authentication Trends ? Roles & Provisioning
-
Conference: 1st European Identity Conference
07.05. - 10.05.2007
, Munich
-
Compliance Trends & Identity Risk Management • Identity Federation •
User Centric Identity • Authentication Trends • Roles & Provisioning
Reports
-
Executive View: IBM Security Policy Management - 70953
25.08.2014
Graham Williamson €190.00
-
Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool to service multiple “relying” applications. It was released under the very successful Tivoli branding because it was part of IDM identity management product line...
Order the report
-
Executive View: IBM Security QRadar® - 70980
04.06.2014
Mike Small €190.00
-
Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. This problem has led to the emergence of Real Time Security Intelligence tools intended to detect cyber-attacks and enable organizations to respond in time to limit damage...
Order the report
-
Executive View: IBM Security Access Manager for Enterprise Single Sign-On - 71068
10.03.2014
Martin Kuppinger €190.00
-
Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both on-premise and cloud-based approaches but targeted on Single Sign-On to Cloud apps. However, in most organizations there are still many legacy applications in on-premise installations in place. Providing single sign-on to all types of applications and services on all platforms increases convenience for users and might also reduce help desk cost. In addition, there are many specific use cases such as hospitals or production environments that require E-SSO for security and efficiency reasons...
Order the report
-
Executive View: IBM SmartCloud Services - 70785
02.10.2013
Mike Small €190.00
-
IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand. IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a new Cloud Services division. This executive view provides an overview of IBM SmartCloud IaaS and PaaS offerings together with an assessment their strengths and challenges in the light of these changes.
Order the report
-
Executive View: IBM Security Intelligence with Big Data - 70743
12.06.2013
Mike Small €190.00
-
Detecting and managing covert attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. IBM Security Intelligence with Big Data is a set of products and services that are intended to respond to these challenges.
Order the report
-
Snapshot: IBM InfoSphere Guardium V 9.0 - 70632
29.01.2013
Martin Kuppinger €190.00
-
IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores, including data warehouses, big data environments, and file shares.
IBM InfoSphere Guardium takes a big step forward from database protection towards data protection. IBM managed this balancing act well with the new release, further extending its strength in the database security market segment and enhancing this to new information management systems This potentially imposes the risk of ending up with a solution that can provide some protection for everything but isn’t leading-edge anymore in its traditional area, i.e. in that case database security, but the product remains leading-edge there will broadening its focus significantly.
Order the report
-
Snapshot: IBM Tivoli Live – service manager - 70386
09.02.2011
-
IBM Tivoli Live - service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management Database), and Asset Management. It is provided as a joint initiative of the IBM Tivoli product group and IBM GTS workplace services. IBM plans to add additional features in the future. IBM Tivoli Live - service manager thus is an additional deployment option for the IBM Tivoli ITSM offerings.
Order the report
-
Product Report: IBM Tivoli Identity Manager
17.09.2010
Martin Kuppinger €95.00
-
The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner. IBM Tivoli Identity Manager supports some integrated Access Governance capabilities beyond classical Identity Provisioning. The focus has shifted from pure provisioning towards the more advanced capabilities around role management, access certification, and SoD policies as well as advanced workflow features. Bundled with IBM TIM is the IBM Tivoli Directory Integrator, which is sort of meta-directory solution which in fact allows connecting to a broad variety of different systems. Based on that approach, IBM can offer a large number of connectors. The product is based originally on the acquisition of the Access360 product by IBM. IBM was amongst the first large software vendors which entered the...
Order the report
Podcasts
-
Mastering the Digitalization of Business: Digital Identities and the Cloud
20.01.2015
-
How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level
It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution.
Watch
-
Access Governance for Today's Agile, Connected Businesses
10.12.2014
-
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
Watch
-
Minimizing Business Risks through Enterprise SSO
18.09.2009
-
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.
Watch
|