Safeguard valuable business data and apps!
Give your business the security it deserves

Are you looking for an Access Management Solution that includes

Web Access Management
Web Single Sign-On
Federation Services
Role Based Access Control & Risk-based/Adaptive Authentication

Then IBM Security Access Manager (ISAM)

Appliance v 9.0 is the right solution for you.

Features

  • Pre-defined Implementation Templates & Productized-Services
  • Our proprietary Ilantus Connector Factory provides a vast number of readily available SSO connectors

Benefits

  • Fixed fee and milestone-based implementation approach
  • Onsite/Offshore Implementation Model
  • Systematic Training and operational handover
  • A proven phase-wise approach that provides quick ROI
  • Easy Integration with Target ApplicationsI


ISAM Implementation Service Packaged Offering

Basic

  • Centralized Authentication System setup for up to 10000 users (Both internal & external)
  • Web Single Sign-on with up to 10 Web Applications
  • Coarse grain policy based authorization for up to 10 Web Applications
  • Federated Sign-On for up to 5 SaaS applications
  • Estimated Time: 12 Weeks

Advanced

  • All Basic Features
  • Risk-Based Access Control
  • Custom Authentication module
  • Estimated Time: 16 Weeks

Are you looking for an Identity Management and/or Access Governance Solution that includes

Identity Lifecycle Management

  • Access Request & Provisioning
  • Business Process implementation using workflows
  • True Role Based Access Provisioning

Access Governance

  • Periodic Access Reviews & Re-certifications
  • Automatic Access Remediation/Fulfillments
  • Access control through compliance policies (include SoDs)

Identity Analytics

  • Centralized Role Management
  • Role mining & modeling
  • Identity Governance Reports
  • Basic

    • Setup centralized Identity Store for up to 10000 users (both internal & external)
    • Integration with up to 10 Target Applications (eg: AD, EBS, SAP etc)
    • Integration with up to 5 home-grown/proprietary applications
    • Implement up to 10 Business process workflows with a maximum of 2-levels of approval for JML use-cases (Joiner, Mover & Leaver)
    • Setup Self-Service Access Request & Password management
    • Estimated Time: 12 Weeks

    Advanced

    • All Basic Features
    • Integration with additional 10 Target Applications
    • Integration with additional 5 home-grown/proprietary applications
    • Implement additional 10 Business process workflow with a maximum of 2-levels approval for JML use-cases (Joiner, Mover & Leaver)
    • Implement Advanced User Provisioning use-cases
    • Estimated Time: 16 Weeks

    Add-Ons:

    • Integration with custom applications (Estimated Time – 1 week, Cost - $5K)
    • Role-based User Provisioning (Estimated Time – 1 Week, Cost - $5K)
  • Basic

    • Setup Centralized Identity Store for up to 10000 users (both internal & external)
    • Integration with up to 10 Target Applications (eg: AD, EBS, SAP etc)
    • Integration with up to 5 home-grown/proprietary applications
    • Setup quarterly/monthly access review campaigns
    • Implement 'Transfer & Termination' workflows with a maximum of 2-levels of approvals
    • Implement up to 50 Access Control polices (such as SoD violations)
    • Estimated Time: 12 Weeks

    Advanced

    • All Basic Features
    • Integration with additional 10 Target Applications
    • Integration with additional 5 home-grown/proprietary applications
    • Setup automatic remediation process
    • Implement Advanced Access Governance Policies
    • Estimated Time: 16 Weeks

    Add-Ons

    • Integration with custom applications (Estimated Time – 1 week, Cost - $5K)
    • Role Management (Estimated Time – 1 Week, Cost - $5K)
  • Basic

    • Setup Centralized Identity Store for up to 10000 users (both internal & external)
    • Integration with up to 10 Target Applications (eg: AD, EBS, SAP etc)
    • Integration with up to 5 home-grown/proprietary applications
    • Setup quarterly/monthly access review campaigns
    • Implement up to 50 Access Control polices (such as SoD violations)
    • Implement up to 10 Business process workflow with a maximum of 2-levels of approval for JML use-cases (Joiner, Mover & Leaver)
    • Setup Self-service Access Request & Password management
    • Estimated Time: 12 Weeks
    • Cost: Request a quote

    Advanced

    • All Basic Features
    • Integration with additional 10 Target Applications
    • Integration with additional 5 home-grown/proprietary applications
    • Implement additional 10 Business process workflow with a maximum of 2-levels approval for JML use-cases (Joiner, Mover & Leaver)
    • Implement Advanced User Provisioning use-cases
    • Implement Advanced Access Governance Policies
    • Estimated Time: 16 Weeks

    Add-Ons

    • Integration with custom applications (Estimated Time – 1 week, Cost)
    • Role Management (Estimated Time – 1 Week, Cost)
image

Call our sales team

+1-866-400-0402


Reach out to us for a customized quote



More Offerings