December 6, 2017 By Michael Bunyard 3 min read

This blog was updated on May 10, 2018 to reflect the latest IBM Security App Exchange offerings and integrations.

Major breaches have opened the floodgates on our personal data. Much of the information that was used to establish identity in the past is now a shared secret in the hands of cybercriminals. Because it’s now widely accepted that passwords alone are no longer enough to verify users’ identities online, options for more advanced multifactor authentication (MFA) have expanded greatly — from hardware-based tokens to biometrics and mobile authentication.

Organizations are now taking advantage of several different types of authentication methods that offer more flexibility to combine technologies and create the right balance of security, privacy and user experience for many different scenarios. These new approaches are often driven by the sensitivity of the data being accessed, as well as the type of user population accessing them. The future of authentication hinges on an organization’s ability to adapt and combine authentication methods based on risk.

New Partner Integrations for IBM Security Access Manager Available via IBM Security App Exchange

The good news is that adoption of multifactor authentication has skyrocketed over the past few years. In fact, a recent survey found that 93 percent of organizations are now using MFA. However, managing and integrating the wide variety of MFA options available is no easy feat. That’s why IBM is announcing new integrations with four leading edge authentication providers to provide customers with easy access to more MFA technologies through IBM Security Access Manager (ISAM).

These new MFA partner integrations will be available as applications for easy download via the IBM Security App Exchange, ranging from hardware-based tokens to biometrics and mobile authentication applications. The new Authentication section of the App Exchange will feature apps from industry leading partners including BuyPass, DualAuth, Imageware and Yubico.

ISAM allows companies to centralize access management for web, mobile and cloud technologies in a single platform, and comes pre-integrated with its own in-house mobile multifactor authentication capability, IBM Verify. The new MFA applications from these partners can now be easily integrated with IBM Security Access Manager via prebuilt connectors available as apps on the IBM App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies.

Check Out the Latest Offerings

Stronger collaboration between security providers in the IAM space is critical in helping our joint customers adopt stronger authentication options that go beyond the password, and ensuring that these technologies are integrated in a way that is both simple and secure.

The new set of multifactor authentication apps available today on the App Exchange include:

  • AutoPassword from DualAuth, which reduces a user’s reliance on insecure passwords by automatically generating and entering a new one-time password for each log in. The password generation technology prevents phishing attacks since users can compare the generated passwords to verify the service. AutoPassword can be combined with any desired form of multifactor authentication to create a uniquely secure environment.
  • Buypass Code from Buypass, a mobile phone and PC application for two-factor authentication. The application is delivered as-a-service per active user and allows employees to easily gain secure access to a wide range of systems and applications like VPNs, ISAM, cloud services and web applications.
  • GoVerifyID from ImageWare provides a highly scalable, mobile authentication solution with choices spanning mobile push, PIN, face, voice, fingerprint and palm biometrics.
  • YubiKey by Yubico, an easy-to-use, multiprotocol hardware authentication device that provides seamless, trusted access to any number of online systems, networks and applications — all with a simple touch.
  • DigitalPersona from Crossmatch, which provides composite authentication (beyond MFA) and a wide array of biometric, mobile, behavioral and traditional user authentication options.
  • BioConnectID from BioConnect, a biometric authentication platform for digital and physical access to any application from any device, including eye, face, voice, finger and behavioral authentication.

Cybercriminals are collaborating with each other to share user information and credentials, making secure identity and access management even more difficult to achieve. As the defenders, we need to take a page from their book when it comes to collaboration and work closely to create a more secure foundation for the future of authentication.

VISIT THE IBM SECURITY APP EXCHANGE

More from

Third-party access: The overlooked risk to your data protection plan

2 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors.The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In this…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today