IBM software eases role-based security operations

IBM software eases role-based security operations

IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based access to a network and application resources.

More on IBM: IBM wins most patents for 19th straight year

The software called "Security Role and Policy Modeler" has been added to the IBM Security Identity Manager suite, IBM's flagship product for policy-based access management and governance.

The tool is able to actively poll a wide range of databases and directories, such as Microsoft Active Directory, Oracle, Siebel and SAP, that are used to store information about employees, their jobs and current access privileges, says Marc van Zadelhoff, vice president of strategy and product management at IBM Security Systems,.

The IBM tool can then analyze collected information in order to define a set of roles and their recommended access rights so users can be grouped for security purposes. That makes it possible to provision or de-provision users based on role. "This automates the setup of role-based permissions," he says.

The modeling tool alleviates the need for more extensive manual reviews by managers to make decisions about organizational roles, which can be a time-consuming process in larger businesses with tens of thousands of people.

IBM is not the only technology firm to offer a modeling tool intended for this purpose, but IBM hopes its tool, developed at IBM Research, will be distinguished by its analytics, such as flagging unusual behavior or inconsistencies in role access and expired user access.

There will always be some employees who will not neatly fall into roles and will have to be regarded as exceptions, but IBM says the modeling tool makes it simpler to establish role-based arrangements for provisioning. There are early adopters of the tool, including Bharti Airtel, a telecommunications provider in India, and IT service company Cognizant. Cognizant's director of security, Barry Miracle, says he expected it would make compliance reporting more efficient.

IBM isn't breaking out the cost for the Security Role and Policy Modeler tool, but notes that deploying identity management in a large organization can run into the hundreds of thousands of dollars.

Read more about wide area network in Network World's Wide Area Network section.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.


ARN Innovation Awards 2022

Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.

EDGE 2022

EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.

Brand Post

Channel Roadmap

The Channel Roadmap is a bespoke content hub housing strategic priorities from technology vendors for 2022 and beyond, partners can find the guidance on the key technologies and markets to pursue, to help build a blueprint for future success.

Show Comments