IBM Privileged Identity Manager V2.1

Compliance / Privacy
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

 

IBM Privileged Identity Manager V2.1 with Identity Governance and Intelligence V5.2.2 help improve privileged user governance.

 

Digital transformation, mobility, and rapidly evolving technologies lead to a more challenging and complex enterprise security landscape. Attackers continuously exploit security vulnerabilities and the exposure to insider threat grows exponentially. In response, security regulations get more demanding and require:

  • Strict controls over privileged access
  • Limited access to sensitive assets
  • Ability to monitor every aspect of privileged user activity to show previous activity, in case of breach
  • Detailed audit records to prove compliance to regulations

 

Organizations that fail security audits need to mitigate elevated security risks that are created by insider threat to implement centralized access enforcement and monitoring controls.

 

Least privilege enforcement across enterprise servers and databases is crucial to this mitigation. Also important is monitoring and recording what privileged users are doing with their access. Shared passwords and login credentials must be tightly managed, to prevent abuse or compromise. Anomalous behavior must be identified and security administrators alerted while there is still time to respond and potentially mitigate a malicious attack or remediate access-related vulnerability.

 

Privileged Identity Manager V2.1

Privileged Identity Manager helps mitigate the insider threat by centrally managing and auditing the use of privileged access credentials across systems, applications, and platforms. These capabilities, along with a holistic, security immune system approach, through integration with QRadar®, Identity Governance and Intelligence, and Guardium® can:

  • Help better adhere to security regulations.
  • Protect sensitive assets.
  • Improve security posture.

 

Privileged Identity Manager V2.1 is updated to include:

  • Privileged Session Gateway function supports agent-less access to shared credentials, in addition to agent-based and manual credential access to provide users greater flexibility in choosing privileged activity controls
  • Additional integration with Identity Governance and Intelligence V5.2.2 to support access recertification of sensitive privileged user access
  • Expanded browser support to include Chrome for web access and expanded Internet Explorer 11 support
  • Additional access profiles for accelerated time to value

 

Identity Governance and Intelligence V5.2.2

Identity Governance and Intelligence provides the identity management and governance features needed to break the entitlement pain chain that leads to role proliferation. It enables information technology analysts to visually manage roles in a manner that can scale with increases in applications and complexity. Identity Governance and Intelligence empowers business managers to make appropriate approval and access certification decisions. Certification campaigns now incorporate Identity Governance and Intelligence, Privileged Identity Manager, and Security Identity Manager environments by using the business activities function to provide a bridge from technical roles and entitlements to business and auditor-defined functions. Identity Governance and Intelligence provides a complete Identity Management and governance solution to ensure enterprise user access remains compliant and secure.

 

Identity Governance and Intelligence V5.2.2 includes many deployment improvements that can reduce time to value, including work item notification and redirection and continued improvement of password management with the Desktop Password Reset Assistant (DPRA). Support of additional user attributes to make entitlement decisions replaces cumbersome, manual tasks with intelligence-based decision support processes.

 

Identity Governance and Intelligence V5.2.2 Enterprise and Lifecycle Editions include entitlement to Security Identity Manager V7.0. This allows existing Identity Manager clients to maintain legacy Identity Manager entitlements and transition to Identity Governance and Intelligence at a pace that fits their project goals.

 

Find out more here.

 

 

 

IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity, and service.

For more information, visit: www.ibm.com.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: