...
IBM     IBM
Wilhelm-Fay-Straße 30-32 • 65936 Frankfurt-Sossenheim
Phone: +49 69 66 45 0
E-Mail: info@de.ibm.com
Internet: http://www.ibm.com/

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. To learn more about IBM Security Systems, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/security

Congress: European Identity & Cloud Conference 2015 05.05. – 08.05.2015 , Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Access Governance for today’s agile, connected businesses 09.12.2014 , 4:00pm CET, 10:00am EST, 7:00am PST
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Minimizing Business Risks through Enterprise Single Sign-on 17.09.2009 , 16:00 CEST
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , München
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , Munich
Compliance Trends & Identity Risk Management • Identity Federation •User Centric Identity • Authentication Trends • Roles & Provisioning
Executive View: IBM Security Policy Management – 7095325.08.2014Graham Williamson €190.00
Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool to service multiple “relying” applications. It was released under the very successful Tivoli branding because it was part of IDM identity management product line…

Order the report

Executive View: IBM Security QRadar® – 7098004.06.2014Mike Small €190.00
Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. This problem has led to the emergence of Real Time Security Intelligence tools intended to detect cyber-attacks and enable organizations to respond in time to limit damage…

Order the report

Executive View: IBM Security Access Manager for Enterprise Single Sign-On – 7106810.03.2014Martin Kuppinger €190.00
Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both on-premise and cloud-based approaches but targeted on Single Sign-On to Cloud apps. However, in most organizations there are still many legacy applications in on-premise installations in place. Providing single sign-on to all types of applications and services on all platforms increases convenience for users and might also reduce help desk cost. In addition, there are many specific use cases such as hospitals or production environments that require E-SSO for security and efficiency reasons…

Order the report

Executive View: IBM SmartCloud Services – 7078502.10.2013Mike Small €190.00
IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand.  IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a new Cloud Services division.  This executive view provides an overview of IBM SmartCloud IaaS and PaaS offerings together with an assessment their strengths and challenges in the light of these changes.

Order the report

Executive View: IBM Security Intelligence with Big Data – 7074312.06.2013Mike Small €190.00
Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail.  IBM Security Intelligence with Big Data is a set of products and services that are intended to respond to these challenges. 

Order the report

Snapshot: IBM InfoSphere Guardium V 9.0 – 7063229.01.2013Martin Kuppinger €190.00
IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores, including data warehouses, big data environments, and file shares. IBM InfoSphere Guardium takes a big step forward from database protection towards data protection. IBM managed this balancing act well with the new release, further extending its strength in the database security market segment and enhancing this to new information management systems This potentially imposes the risk of ending up with a solution that can provide some protection for everything but isn’t leading-edge anymore in its traditional area, i.e. in that case database security, but the product remains leading-edge there will broadening its focus significantly.

Order the report

Snapshot: IBM Tivoli Live – service manager – 7038609.02.2011
IBM Tivoli Live – service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management Database), and Asset Management. It is provided as a joint initiative of the IBM Tivoli product group and IBM GTS workplace services. IBM plans to add additional features in the future. IBM Tivoli Live – service manager thus is an additional deployment option for the IBM Tivoli ITSM offerings.

Order the report

Product Report: IBM Tivoli Identity Manager17.09.2010Martin Kuppinger €95.00
The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner. IBM Tivoli Identity Manager supports some integrated Access Governance capabilities beyond classical Identity Provisioning. The focus has shifted from pure provisioning towards the more advanced capabilities around role management, access certification, and SoD policies as well as advanced workflow features. Bundled with IBM TIM is the IBM Tivoli Directory Integrator, which is sort of meta-directory solution which in fact allows connecting to a broad variety of different systems. Based on that approach, IBM can offer a large number of connectors. The product is based originally on the acquisition of the Access360 product by IBM. IBM was amongst the first large software vendors which entered the…

Order the report

Mastering the Digitalization of Business: Digital Identities and the Cloud20.01.2015
How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution. Watch
Access Governance for Today’s Agile, Connected Businesses10.12.2014
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access. Watch
Minimizing Business Risks through Enterprise SSO18.09.2009
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.