...
IBM     IBM
Wilhelm-Fay-Stra�e 30-32 • 65936 Frankfurt-Sossenheim
Phone: +49 69 66 45 0
E-Mail: info@de.ibm.com
Internet: http://www.ibm.com/

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. To learn more about IBM Security Systems, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/security

Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Minimizing Business Risks through Enterprise Single Sign-on 17.09.2009 , 16:00 CEST
Receiving approval for project budgets has been difficult in these days, especially if there isn�t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , M�nchen
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , Munich
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Executive View: IBM Security QRadar� – 7098004.06.2014Mike Small €190.00
Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. This problem has led to the emergence of Real Time Security Intelligence tools intended to detect cyber-attacks and enable organizations to respond in time to limit damage…

Order the report

Leadership Compass: Enterprise Key and Certificate Management – 7096108.04.2014Rob Newby €1295.00
Enterprise Key and Certificate Management (EKCM) is made up of two niche markets that are converging. This process still continues, and as with all major change of IT market segments, is driven by customer requirements. These customer requirements are driven by security and compliance needs. Up until recent times, compliance has been the bigger driver, but increasingly in the days of Cloud and mobile technology security of data in storage; data in the hands of others that is, security requirements have been brought to the fore. The constituent parts of EKCM are Enterprise Key Management (EKM) and Enterprise Certificate Management (ECM).

Order the report

Executive View: IBM Security Access Manager for Enterprise Single Sign-On – 7106810.03.2014Martin Kuppinger €190.00
Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both on-premise and cloud-based approaches but targeted on Single Sign-On to Cloud apps. However, in most organizations there are still many legacy applications in on-premise installations in place. Providing single sign-on to all types of applications and services on all platforms increases convenience for users and might also reduce help desk cost. In addition, there are many specific use cases such as hospitals or production environments that require E-SSO for security and efficiency reasons…

Order the report

Leadership Compass: Enterprise Single Sign-On – 7096227.01.2014Martin Kuppinger €1295.00
The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of mature products that suit their needs. As always, however, it is about the details. Some solutions offer specific features that are relevant to specific use cases, such as unlocking multiple systems for traders in the finance industry or in control rooms. Thus when selecting vendors, it is strongly recommended to thoroughly look at support for the more specific use cases – that is where even the Leaders differentiate significantly. In fact, there are no weak vendors in that analysis. All of the vendors show particular strength and provide a good foundation for addressing the E-SSO challenges of organizations.

Order the report

Executive View: IBM SmartCloud Services – 7078502.10.2013Mike Small €190.00
IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand.  IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a new Cloud Services division.  This executive view provides an overview of IBM SmartCloud IaaS and PaaS offerings together with an assessment their strengths and challenges in the light of these changes.

Order the report

Executive View: IBM Security Intelligence with Big Data – 7074312.06.2013Mike Small €190.00
Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail.  IBM Security Intelligence with Big Data is a set of products and services that are intended to respond to these challenges. 

Order the report

Snapshot: IBM InfoSphere Guardium V 9.0 – 7063229.01.2013Martin Kuppinger €190.00
IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores, including data warehouses, big data environments, and file shares. IBM InfoSphere Guardium takes a big step forward from database protection towards data protection. IBM managed this balancing act well with the new release, further extending its strength in the database security market segment and enhancing this to new information management systems This potentially imposes the risk of ending up with a solution that can provide some protection for everything but isn’t leading-edge anymore in its traditional area, i.e. in that case database security, but the product remains leading-edge there will broadening its focus significantly.

Order the report

Leadership Compass: Identity Provisioning – 7015115.10.2012Martin Kuppinger €1295.00
Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity Provisioning market segments. It shows that there are several established vendors with mature solutions, but also some very interesting smaller or regional vendors with a good potential for growth and for delivering what customers require. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit. However, this Leadership Compass will help identifying those vendors customers should have a closer look at.

Order the report

Snapshot: IBM Tivoli Live � service manager – 7038609.02.2011
IBM Tivoli Live – service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management Database), and Asset Management. It is provided as a joint initiative of the IBM Tivoli product group and IBM GTS workplace services. IBM plans to add additional features in the future. IBM Tivoli Live – service manager thus is an additional deployment option for the IBM Tivoli ITSM offerings.

Order the report

Product Report: IBM Tivoli Identity Manager17.09.2010Martin Kuppinger €95.00
The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner. IBM Tivoli Identity Manager supports some integrated Access Governance capabilities beyond classical Identity Provisioning. The focus has shifted from pure provisioning towards the more advanced capabilities around role management, access certification, and SoD policies as well as advanced workflow features. Bundled with IBM TIM is the IBM Tivoli Directory Integrator, which is sort of meta-directory solution which in fact allows connecting to a broad variety of different systems. Based on that approach, IBM can offer a large number of connectors. The product is based originally on the acquisition of the Access360 product by IBM. IBM was amongst the first large software vendors which entered the…

Order the report

Minimizing Business Risks through Enterprise SSO18.09.2009
Receiving approval for project budgets has been difficult in these days, especially if there isn�t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies. Watch
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.