Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

Video/Webcast | Presented by Splunk

Enhance your Security Detections with Machine Learning

In this talk we will use password spraying as an example use case to showcase how detections can be matured through the use of Machine Learning.

Analyst Report | Presented by IBM

2020 KuppingerCole Leadership Compass for PAM

IBM Security Verify Privilege Vault is powered by technology from Thycotic, an IBM Partner.

Analyst Report | Presented by IBM

2021 KuppingerCole Leadership Compass for Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms.

White Paper | Presented by Splunk

A Brief Guide to a Secure Multicloud Environment

As more organizations are shifting infrastructure and services to the cloud, more are adopting a multicloud strategy.

Miscellaneous | Presented by IBM

CIAM Stakeholder Smartpaper

Consumer Identity and Access Management (CIAM) is an outgrowth from enterprise Identity and Access Management (IAM) that has become a substantial market of its own.

Analyst Report | Presented by IBM

Forrester Total Economic Impact of IBM Security Verify

IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study examining the potential return on investment (ROI) that organizations may realize from deploying IBM Security Verify as an identity-as-a-service (IDaaS) solution in tandem with their on-premises IAM infrastructure.

Analyst Report | Presented by IBM

KuppingerCole Executive View, IBM Security Verify for CIAM, April 2021

IBM Security Verify is an industry-leading Consumer Identity and Access Management (CIAM) solution that can satisfy both B2B and B2C requirements.

Analyst Report | Presented by IBM

KuppingerCole Leadership Compass for Identity Fabrics, 2021

This report provides an overview of the market for Identity Fabrics, comprehensive IAM solutions built on a modern, modular architecture, and provides you with a compass to help you to find the solution that best meets your needs.

Video/Webcast | Presented by LRQA

On-demand webinar: Is your organization prepared for emerging information & cyber security threats?

• How would your organization handle a security breach or theft of valuable and sensitive information? Do you have effective controls and measures in place? Panelists discuss trends, consequences and how effective management of information and cyber security threats can support organizational resilience.

Miscellaneous | Presented by IBM

Protect and transform your enterprise with a holistic IAM program

Lost or stolen credentials are one of the most common causes of data breaches, as well as the most expensive. Without a comprehensive and up-to-date IAM program your users, assets and data are exposed to significant security risk.

Load More