Protect any identity
Workforce and consumer identity and access management (IAM) have vastly different frameworks — but a shared technical solution can accelerate both. IBM Security™ Verify is a single identity-as-a-service (IDaaS) solution that delivers both workforce modernization and consumer digital transformation. Verify features comprehensive cloud IAM capabilities, from deep risk-based authentication to automated consent management.
Workforce IAM
Accelerate workforce productivity, deliver IT modernization and embed identity into zero-trust initiatives to help protect your organization.
Consumer IAM
Facilitate on-demand, personalized and trusted experiences for your consumers. Deliver simple registration, frictionless engagement and privacy-aware profile management and administration.
Capabilities
Single sign-on
Centralize access control for cloud and on-prem applications.
Eliminate password hassles
Secure access to all your applications with a single set of login credentials. IBM Security™ Verify software provides centralized access control, strong authentication and user self-service. Deliver one-click access within an authenticated session to cloud, on-prem and mobile applications, from a unified single sign-on (SSO) launchpad.
Configuring single sign-on with IBM Security Verify (04:46)
Adaptive access
Proactively protect users and assets with risk-based authentication.
Comprehensive context is key
Effective access control must balance trust and risk. IBM Security™ Verify SaaS software uses machine learning and AI to analyze key parameters — user, device, activity, environment and behavior — in context to determine holistic risk scores. This analysis drives more accurate, contextual authentication decisions to better protect both your business and your users’ experience.
Adapt for risk
Proactively protect users from risk with the flip of a switch by applying holistic, AI-informed risk scores to access policies. Allow streamlined access to low-risk users. Block or challenge access in higher-risk conditions with contextual, risk-based authentication and adaptive access.
Adapting for risk with adaptive access policies (09:52)
Monitor risk levels of events
Filter authentication activity to diagnose problems. View details of high-risk events that are sent to case management.
Monitoring events through reports (04:52)
Advanced authentication
Go beyond basic authentication with options for passwordless or multifactor authentication.
Multifactor authentication (MFA) everywhere
With IBM Security™ Verify SaaS software you can protect accounts with an additional security layer. Meet compliance requirements with a common approach to MFA across apps, VPN, Windows desktops and Linux. Or go fully passwordless with QR code and FIDO2 authentication.
Adding MFA to cloud and on-prem apps (05:38)
Passwordless authentication
Choose options such as QR codes and FIDO devices. Use FIDO2 hardware security keys as a single factor or second factor, and use MFA from the key itself for higher levels of assurance.
Delivering passwordless authentication (02:32)
Lifecycle management
Connect application access with business governance workflows.
Simplify identity provisioning
Use API-based or SCIM-based provisioning for select applications. Apply supporting agents and adapters for Active Directory and for other on-prem targets like LDAP or Oracle.
Integrating with Active Directory and ServiceNow (03:40)
Automate recertification
Establish a recertification cadence for higher-risk apps to meet compliance requirements. Run concurrent and recurring certification campaigns based on users, groups or both.
Automating recertification campaigns (05:04)
Delegate access control
Delegate application ownership to line-of-business managers, and empower them to provide employees with faster app access and a full app catalog.
Simplifying access requests (02:25)
Identity analytics
Scan for risks across users, entitlements and applications.
Gain a holistic view of IAM risks
The identity analytics capability in IBM Security™ Verify software provides visibility into the overall health of your IAM environment. Scan for identity lifecycle risks across users, entitlements and applications to generate actionable intelligence.
Automating identity analytics (03:52)
Highlight anomalies
Discover suspicious outliers within your organization, like deviations in user entitlement. Dig deeper into violations details and accumulated AI-powered risk scores.
[]
Get decision support
Weigh the calculated confidence scores to make informed decisions. Take remediation actions suggested by Verify, such as recertifying access or removing an entitlement.
[]
Consent management
Templatize granular requirements to help address privacy laws.
Build trust with data privacy
IBM Security™ Verify SaaS software provides a centralized decision engine to help automate consent determination rules across data usage purposes. There’s no need to reinvent procedures for every app. Verify can control how data should be collected, how it can be used and under what conditions consent is required.
Streamline privacy and consent management (0:43)
Tie data usage to purposes
Stipulate business purposes like marketing promotions, communications or cookie management. For each purpose, specify access and retention parameters for relevant user attributes.
Enforcing data privacy and consent management (07:31)
Create custom privacy rules
Specify conditions under which attributes and other purposes need user consent. Sequence through all created rules to check for applicable conditions and to ensure coverage.
[]
Apply purposes and EULAs
Assign data usage purposes or end user license agreements (EULAs) to each app. Delegate data usage decisions to simplify updates. Maintain an audit trail of consent activity across apps.
[]