Access management - IBM Security Identity Manager

In a security lifecycle, IBM Security Identity Manager and several other products provide access management. You can determine who can enter your protected systems. You can also determine what can they access, and ensure that users access only what they need for their business tasks.

Access management addresses three questions from the business point of view:

These products validate the authenticity of all users with access to resources, and ensure that access controls are in place and consistently enforced:

ISIM provides a secure, automated, and policy-based user management solution to manage user identities throughout their lifecycle across both legacy and e-business environments. ISIM provides centralized user access to disparate resources in an organization, with policies and features that streamline operations associated with user-resource access.

Benefits:

For more information about how access management products fit in larger solutions for a security lifecycle, see the IBM Security Management website: http://www.ibm.com/security/

IBM Redbooks and Redpapers also describe implementing IBM Security Identity Manager within a portfolio of IBM security products.

Parent topic: Features overview