IBM Security Access Manager

Similar documents
Accelerating growth and digital adoption with seamless identity trust

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

Combatting advanced threats with endpoint security intelligence

The McGill University Health Centre (MUHC)

May the (IBM) X-Force Be With You

How to Secure Your Cloud with...a Cloud?

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Best Practices in Securing a Multicloud World

IBM BigFix Compliance

IBM dashdb Local. Using a software-defined environment in a private cloud to enable hybrid data warehousing. Evolving the data warehouse

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

IBM WebSphere Cast Iron Live V7.5 delivers key enhancements that include improved security capabilities and increased connectivity options

High performance and functionality

Securing global enterprise with innovation

IBM Security Network Protection Solutions

IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th

Networking for a dynamic infrastructure: getting it right.

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Multi-cloud business continuity and data reuse

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Penetration testing a building automation system

Mobilize your corporate content and apps

Secure Access for Microsoft Office 365 & SaaS Applications

IBM SmartCloud Notes Security

IBM System Storage EXP3500 Express

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

IBM Future of Work Forum

Crash course in Azure Active Directory

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

IBM Next Generation Intrusion Prevention System

GETTING STARTED WITH IDENTITY AND ACCESS MANAGEMENT

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility

Enhanced Threat Detection, Investigation, and Response

IBM Internet Security Systems Proventia Management SiteProtector

Fabrizio Patriarca. Come creare valore dalla GDPR

Maximize your move to Microsoft in the cloud

IBM TS7700 grid solutions for business continuity

Eight important criteria for selecting a managed security services provider

IBM Cloud Internet Services: Optimizing security to protect your web applications

Features. HDX WAN optimization. QoS

Design and deliver cloud-based apps and data for flexible, on-demand IT

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

IBM Security Guardium Data Activity Monitor

IBM Z servers running Oracle Database 12c on Linux

Aligning with HIPAA mandates in healthcare

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

PCI DSS Compliance. White Paper Parallels Remote Application Server

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Closing the Biggest Security Hole in Web Application Delivery

Open platform for database-as-a-service. (DBaaS) on IBM Power Systems solution. A modern, optimized platform for the cognitive era.

Ten rules for bring your own device (BYOD)

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

McAfee Network Security Platform 9.2

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

To extend its DataLift 360 ad placement offering to app developers and publishers worldwide, AppLift

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Integrated, Intelligence driven Cyber Threat Hunting

SYMANTEC DATA CENTER SECURITY

IBM Real-time Compression and ProtecTIER Deduplication

AKAMAI CLOUD SECURITY SOLUTIONS

Pulse Secure Application Delivery

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

A10 HARMONY CONTROLLER

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Accelerate Your Enterprise Private Cloud Initiative

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Move, manage, and run SAP applications in the cloud. SAP-Certified Infrastructure from IBM Cloud

WHITEPAPER. How to secure your Post-perimeter world

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Securing Office 365 with MobileIron

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Protecting Your Cloud

IBM Power Advanced Compute (AC) AC922 Server

Make security part of your client systems refresh

Information empowerment for your evolving data ecosystem

Cisco Start. IT solutions designed to propel your business

The Modern Web Access Management Platform from on-premises to the Cloud

IBM Spectrum Control. Monitoring, automation and analytics for data and storage infrastructure optimization

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Sustainable Security Operations

BlackBerry Enterprise Identity

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Desktop Virtualization Endpoint Solutions for SMB. Erik Willey The VDI Endpoint Authority

Smarter Computing at Sogeti

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

Sichere Applikations- dienste

Defending against increasingly sophisticated DDoS attacks

Nutanix InstantON for Citrix Cloud

Transcription:

IBM Access Manager Take back control of access management with an integrated platform for web, mobile and cloud Highlights Protect critical assets with risk-based and multi-factor authentication Secure consumer identities and deliver convenient access experiences at scale Facilitate a secure application programming interface (API) ecosystem by enabling user authentication Unify access control and security between on-premises and cloud environments Manage hybrid identity-as-a-service deployments via pre-integration with IBM Cloud Identity Connect Enforce mobile access control policies that integrate with mobile device management, application development and risk detection solutions Simplify web and mobile user experiences with single sign-on (SSO) As organizations undergo digital transformation, nearly every part of a business is now or soon will be available digitally. The majority of businesses today must offer digital experiences tailored to their users that are available across a wide range of devices from traditional PCs to mobile and an ever-growing list of other connected gadgets. Access management is the key to delivering personalized experiences and maintaining security in the rapidly evolving digital world. IBM Access Manager allows organizations to deliver the access management required to embrace this digital transformation without sacrificing security. It helps enforce risk-based access policies that provide minimal friction during authentication when the user is known and stronger, multi-factor authentication if the risk is elevated. It enables enforcing security polices consistently across multiple channels, letting users interact with the devices they choose with a consistent experience. IBM Access Manager is a modular platform for web, mobile, and cloud access management, multi-factor authentication, risk-based authentication, web-application protection, and identity federation. Its integrated appliance form factor allows for flexible, automated deployment on-premises or in the cloud. This includes taking advantage of Docker container orchestration frameworks like Kubernetes. Authentication methods are always changing. Integrations available on IBM App Exchange allow administrators to easily integrate third-party authentication mechanisms such as biometrics and hardware tokens from pre-certified business partners into IBM Access Manager, without custom coding.

IBM Access Manager is delivered using a security appliance designed to secure user access and protect content against common web attacks. Key benefits include: A centralized integration platform for user access security, allowing organizations to avoid having to modify application code when access or authentication requirements change Better protection from advanced threats including the top 10 web application risks documented by the Open Web Application Project (OWASP) Enhanced user productivity with secure user access to web and mobile applications through SSO, session management, multi-factor authentication and context-based access policy enforcement A low-friction, security-focused, consumer identity infrastructure to facilitate user adoption of digital channels Federated SSO, which helps enhance user productivity and facilitates trust through the delivery of SSO across separately managed domains, including easily configurable connections to popular software-as-a-service (SaaS) applications Integration with IBM MaaS360 and IBM Trusteer solutions for providing the risk context used in access decisions IBM Access Manager is structured as a platform with two optional add-on modules. All required code is included with the base appliance; users enable an add-on module s functionality by entering the appropriate activation keys. This allows users the flexibility to more easily support multiple usage scenarios while minimizing the additional software required. Take back control of access management Consumers Employees Partners and contractors IBM Access Manager Multi-factor authentication Fine-grained authorization Single sign-on Federation Risk-based access Application protection Enterprise applications Cloud workloads Software-as-aservice applications 2

One platform offering, with easily consumable add-on modules IBM Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile and cloud applications and APIs. The integrated appliance form factor allows for easier, more flexible and automated deployment and maintenance on-premises or in the cloud. It is offered as a physical appliance, a virtual appliance that runs on a number of popular hypervisors, or as a Docker image. According to the OWASP top 10 list of web vulnerabilities, external hackers use SQL injections, broken authentication and cross-site scripting (XSS) as common methods to gain unauthorized access into web applications. 1 Utilizing research from the IBM X-Force threat research team, IBM Access Manager delivers the ability to help block OWASP top 10 web vulnerabilities before they reach the targeted application. IBM Access Manager Advanced Access Control Module Identity fraud, bring-your-own-device (BYOD) initiatives and increasing regulatory requirements for authentication are increasing security challenges for enterprises undergoing a digital transformation. In the face of these challenges, it is important to provide increased intelligence to authentication and authorization. The Advanced Access Control Module for IBM Access Manager allows the solution to use detailed contextual information (for example, geographic location, device fingerprint, browser type or application data) in assessing the risk of a user when making access decisions. Additional key capabilities of the Advanced Access Control Module include: Platform Add-ons The modular approach Advanced access control Federation IBM Access Manager Multi-factor authentication with the IBM Verify mobile application for authentication, supporting fingerprint verification on compatible devices as well as time-based, email and SMS one-time password mechanisms IBM Mobile Access SDK for building authentication into custom-developed mobile applications on the Google Android and Apple ios platforms Risk scoring engine to enforce context-aware authorization using information about the users, their mobile devices and other transactions-based information More secure mobile transactions with a graded level of trust designed to allow and deny access using mobile device fingerprinting, geographic location awareness and IP reputation Integration with MaaS360 to enforce corporate security policies when making access decisions for enterprise mobile devices Integration with Trusteer solutions, allowing IBM Access Manager to use sophisticated indicators of identity, behavior, malware, device and fraud risk in making access decisions A graphical policy management interface that supports authoring complex policies 3

IBM Access Manager Federation Module Collaboration between organizations is a central tenet of business. In some cases, users from collaborating organizations require secure access to each other s applications. And increasingly, internal users need access to externally hosted services, including cloud-based SaaS and business partner applications. Federated access helps enable these scenarios by delivering a secure, seamless sign-on experience to external applications, helping eliminate the need for providing multiple user IDs and passwords. This may lead to gains in user productivity and user experience, as well as reductions in the cost of administration. In a federated environment, users authenticate once, then obtain access to applications inside and outside their network infrastructure. The Federation Module for IBM Access Manager accelerates an organization s adoption of third-party enterprise SaaS applications by enabling out-of-the-box connectors to popular applications. Using these connectors, the organization can rapidly give users access to an application without creating an additional set of logins. The Federation Module also helps increase security and visibility by linking a user s enterprise identity to the identity at the third-party application provider. IBM Access Manager Federation Module provides key capabilities that include: Federated SSO for users across multiple applications Support for SAML 2.0 and OpenID Connect protocols for federated access Pre-integrated federation connectors to popular cloud applications token service for identity token validation and mediation IBM Access Manager at a glance Physical characteristics of hardware appliance: Machine specifications for hardware appliance: Platform support for virtual appliance: Supported web browsers: Performance data: 1U form factor H x W x D: 44.2 mm x 430.2 mm x 650 mm (1.74 in. x 16.9 in. x 25.6 in.) Management interface: 10/100/1000 Application interface: 10/100/1000 (IPv6 supported) Supported physical media types: RJ-45 Redundant power supplies Solid-state storage 100 240 V, full range Intel Core E3-1275 processor 64 GB memory 800 GB solid-state drive 6 network ports* VMware ESX environment IBM Cloud Bare Metal Amazon Web Services (AWS) Citrix XenServer Kernel-based Virtual Machine (KVM) Microsoft Azure Microsoft Hyper-V Docker Google Chrome Microsoft Edge Mozilla Firefox Throughput: Up to 1.3 Gbps or 42,000 requests per second Latency: Down to 0.8 ms Large-packet throughput: Up to 1.3 Gbps Small-packet throughput: Up to 42,000 requests per second Authentication throughput: Up to 2,400 logins per second 4

Why IBM? IBM solutions are trusted by organizations worldwide for identity and access management. The proven technologies enable organizations to protect their most business-critical resources from the latest security threats. Going beyond traditional point solutions, IBM Access Manager integrates with many other IBM solutions to provide next-generation access management for a multiperimeter world. Organizations can use IBM QRadar Intelligence Platform to get actionable insights that can help them stay a step ahead of new types of attacks while helping facilitate regulatory compliance. Out-of-the-box consumption of context data from IBM Trusteer Mobile SDK and IBM MaaS360 Secure Mobile Browser enables users to create comprehensive access policies that include fraud and malware detection without modifying applications. IBM Access Manager also provides built-in support for MaaS360 developed mobile applications by enabling seamless authentication and authorization of users along with risk-based access enforcement. As new threats emerge, IBM can help organizations build on their core security infrastructure with a full portfolio of products, services and business partner solutions. IBM empowers organizations to reduce their security vulnerabilities and focus on the success of their strategic initiatives. For more information To learn more about IBM Access Manager and start your 90-day, no-cost trial, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/identity-access-management About IBM solutions IBM offers one of the most advanced portfolios of enterprise security products and services, to help organizations holistically protect their people, infrastructures, data and applications. Backed by world-renowned X-Force research and development, IBM offerings cover identity and access management, endpoint management, network security and more, and with solutions for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. Additionally, IBM Global Financing provides numerous payment options to help you acquire the technology you need to grow your business. We provide full lifecycle management of IT products and services, from acquisition to disposition. For more information, visit: ibm.com/financing 5

Copyright IBM Corporation 2018 IBM New Orchard Road Armonk, NY 10504 Produced in the United States of America January 2018 IBM, the IBM logo, ibm.com, MaaS360, QRadar, Trusteer, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both. VMware is a trademark of VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. * Two of these ports are dedicated to appliance management. Performance data quoted for IBM Access Manager for Web is based on testing with HTTP and HTTPS traffic that is intended to be reflective of typical live traffic. Environmental factors such as protocol mix and average packet size will vary in each network, and measured performance results will vary accordingly. IBM Access Manager for Web throughput was determined by pushing traffic through the appliance and measuring how much throughput was achieved with zero packet loss and low response times. For benchmark testing, IBM Access Manager for Web appliances were configured with worker-threads = 300 and maximum-cached-persistent-connections = 300; large-file throughput was measured with multiple clients requesting 50 Kb. 1 IBM Access Manager: Web Application Protection, Performance, Federation & Risk-Based Access Evaluation, Tolly Enterprises, LLC, Commissioned by IBM, June 2016. http://www-01.ibm.com/common/ssi/cgi-bin/ssialias? htmlfid=wgl03120usen The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. Please Recycle SED03160-USEN-02