IBM Verify
Identity
Protection
1
Why Identity Fabric? Digital
Hybrid Adversarial
cloud transformation AI
IT modernization leaves Fragmented
organizations managing
Identity Silos
fragmented cloud and
Abandoned
Legacy Apps
legacy solutions Inconsistent
Security Policies
2
Inconsistent Elevated identity Expensive A simplified and
user experience risk and drift management
integrated identity
Different IAM solutions Disconnected identities Teams lack the ability and
have different capabilities, lead to a fragmented view budget to manage policy
strategy is needed
making consistent policy of user behavior across the and compliance across
and authentication enterprise and unintentional IAM stacks, abandoning
impossible access exposure protection for legacy apps
IBM Security
… leaving identity in hybrid environments complex and vulnerable
Fragmented
Hybrid cloud adoption
67% Identity Directories
Digital transformation of enterprises will use
three or more clouds
Single Sign On
Local Cloud
Directory
Abandoned
Legacy Apps
Modern SaaS
Identity
Solution
New Modern On Legacy
Apps Premise Apps
Legacy
Directory
Multifactor
Authentication
Inconsistent Microsoft
Amazon
Azure
Security Policies Modern SaaS
Cloud
Directory
Legacy Identity Pre-Production Local Cloud
Risk Based Solution Apps Identity Solution
Authentication
IBM Security 3
Managing the Identity Fabric
Identity Fabric
Fundamentals
Microsoft New Modern
1. Orchestrate integration Azure Apps
across existing identity
solutions Identity
Protection SOC
2. Consolidate identity silos Amazon Modern (ITDR/
Consolidated Modern SaaS Modern Multi Factor Cloud Apps ISPM)
3. Enable efficient risk-based Directory Identity Risk Based Authentication
Solution
authentication Authentication
Application
Gateway
4. Integrate legacy apps to
modern authentication
5. Ensure proper governance
across identities… Legacy Identity On Legacy
Solution Premise Apps
6. …including privileged users
7. Deliver actionable insights Orchestration of User and Security Journeys
across identity posture
and threats (Identity
Protection = ITDR + ISPM)
4
IBM Security
IBM VERIFY IDENTITY PROTECTION
“Hackers don’t break in, they login"
Protecting identity & identity systems across the Identity Fabric requires
in-depth insights leveraging ITDR & ISPM methodologies
Continuous identify security posture and threats detection
Discover Expose Detect
Security Blind Spots Infrastructure Gaps Risky Activity
Shadow assets, directories Dangerous identities Identify exposures, threats and
Unauthorized local accounts Misconfigurations and attacks in real-time with
MFA bypass hazardous deviations from detailed contextual analysis
Dormant service accounts security policy
New! IBM Verify
Identity Protection
A cloud-based solution that helps efficiently identify
and remediate identity posture issues and threats for
managed and unmanaged identities across multiload,
SaaS, and on-premises environments.
Over 70 detection logics
• Identity & Access Blind Spots
• Identity Infrastructure Exposures
• Risky Identity Accesses
Out-of-the-box connectors
• IBM Verify SaaS
• IBM Qradar
+ other market leading SIEM and IAM solutions Identity Now easy to discover &
Threats quick to remediate 6
IBM Verify Identity Protection:
Core Capabilities
Identity Security Identity Threat Identity Incident
Identity-Based Secure Privilege
Posture Detection & Investigation and
Zero Trust Access
Management (ISPM) Response (ITDR) Response
Gain visibility into all
Secure the identity
activity connected to Provide full identity Proactively plan what Know what to
infrastructure with
identities, assets and context to any to include in your include in your
the industry’s first
directories across any cyberthreat or Zero Trust solution privileged access
enterprise-level ITDR
cloud or platform. incident, allowing via full identity and solution, including
by monitoring ALL
This enables real- you to quickly access visibility. This service accounts and
your identity
time detection of determine all ensures there is no users. Be confident
infrastructure
identity-related blind identities involved authorized access that your privileged
solutions to
spots in your identity discover the “who, through your Zero access solution is
holistically detect
infrastructure as well what, when and Trust solution and continually doing its
identity threats,
as potentially where” surrounding that no one bypasses job, and nothing is
exposures and
dangerous the incident. it. slipping through.
vulnerabilities.
misconfigurations.
IBM Verify Identity Protection:
Top Use Cases
Identity Infrastructure Issues Identity Blind Spots Risky Identity Activity
MFA issues (e.g. bypass) Exposed Assets Bypass of ZTNA
Credential Hygiene Shadow Access (Local accounts) Bypass of VPN
Service Accounts Security Shadow Assets Bypass of PAM tools
Shadow Identity Systems
Suspected Attacks on Identity Systems (Directories, Password Managers, Key Suspicious access/identity activity
Managers)
Shadow SaaS Usage
Identity Observability – Who accesses what, when, and how…and how often
IBM Verify Identity Protection’s unique technology combines directory info with
real-time access streaming for continuous access protection.
DATA COLLECTION &
ENRICHMENT
DISCOVER Remediate/
API (Agentl ess ) / Fl ows (AI/ML) PREVENT
DIRECTORY/IdP
Map Deep Learn Response
Events Directories Risk
(Auth &
Assets, Flow, Access Map, Behaviors, Policies, Setting &
access Intelligence
Access) & user details feeds Construct Blind Spots… Configuration
FLOW ACTIVITY
Network flows SIEM/XDR Logs
(VPC, NetFlow, (SASE, VPN,
IPFIX, etc.) & Gateway)
CONTINUOUS ACCESS FLOW MAPPING
IBM Verify Identity Protection:
Flexible & Easy Deployment Options
CLOUD SIEM DEPLOYMENTS SIEM DEPLOYMENTS DIRECT DEPLOYMENTS
AP
I
AP
API
I
Secure Tunnel (HTTPS)
Secure Tunnel (HTTPS)
Cloud Infra Cloud IDPs
Cloud Infra Cloud IDPs Cloud Infra Cloud IDPs
Cloud SIEMs
O N - P R E M I S E O N - P R E M I S E O N - P R E M I S E
AD Sensor Flow Sensor
SIEMs Flow Sensor
Active Network On-Premise Active Network On-Premise Active Network On-Premise
Directory Access Network Directory Access Network Directory Access Network
Infra Infra Infra Infra Infra Infra
IBM Verify
Simplified hybrid identity transformation;
Delivering an effective AI-infused identity fabric with vendor agnostic Identity Orchestration
Complement
Existing Solutions
Maximize current
investments and strategic
choices
Simplify & Automate
Identity Modernization
Leverage a no-code/low-
code orchestration engine
Comprehensive and
Consistent Coverage
Improve security posture and
user experiences
IBM Security 11
Delivering the AI-infused Identity Fabric with IBM Verify
AI-infused consistent policy and operations across tools like Okta, Ping and SailPoint
Continuous Access Control
Single Sign-On and MFA Lifecycle management
1 Individual packaging
Adaptive access Privileged access Provide core capabilities
Workforce Identity Consumer Identity
Drive cloud modernization, Deliver on-demand, in individually packaged,
Privacy and consent management
technical agility and Passwordless authentication personalized, and vendor agnostic
user productivity trusted experiences
solutions*
2 Fill identity fabric gaps
Solutions Simplify the journey to
Access Management Identity and Governance Privileged Access Management
drive identity efficiency,
security and compliance,
with support for virtually
Risk Based Identity Protection
Capabilities Directory* Access Gateway*
Authentication* (ITDR + ISPM)
Orchestration unlimited scale
Lightweight
Provisioning SSO MFA Passwordless
Governance
* Available Stand-Alone or as part of platform
What’s Next Format: 3-hour interactive design thinking session, virtual or in-
person, facilitated by senior IBM security architects &
No-cost discovery and framing workshop consultants.
Focus: Workshop exercises help you identify gaps in your
identity governance, access control and privileged account
management capabilities.
Participants: Includes 5-7 participants such as security leaders,
security and enterprise architects, security analysts, and other
IT representatives from the data, application, and operational
areas of your organization.
Accelerate your security posture while protecting
your investments Deliverables: 1-2 weeks after the session, IBM will provide a
customized, client- confidential report that highlights the top
The Identity Fabric Framing & Discovery business priorities, critical capabilities and areas for
Workshop provides a collaborative review of your improvement in the form of a prioritized list of initiatives along
security program including a holistic analysis of with recommendations to increase security maturity and
people, processes, and technology to align mitigate risk.
stakeholders, understand your current security
landscape, and prioritize key initiatives to This no-cost session is a joint investment as part of IBM’s
partnership with your org. Learn more and sign up at:
mitigate risk. ibm.com/security/resources/workshop
Backup: IBM Portfolio for Managing the Identity Fabric
Identity Fabric
Fundamentals
Microsoft New Modern
1. Orchestrate integration Azure Apps
across existing identity
solutions Identity
Protection SOC
2. Consolidate identity silos Amazon Modern (ITDR/
Consolidated Modern SaaS Modern Multi Factor Cloud Apps ISPM)
3. Enable efficient risk-based Directory Identity Risk Based Authentication
Solution
authentication Authentication
Application
Gateway
4. Integrate legacy apps to
modern authentication
5. Ensure proper governance
across identities… Legacy Identity On Legacy
Solution Premise Apps
6. …including privileged users
7. Deliver actionable insights Orchestration of User and Security Journeys
across identity posture
and threats (Identity
Protection = ITDR + ISPM)
15
IBM Security
IBM Verify Identity Protection:
Core Capabilities