8 Posts

Michael Bunyard

IAM Product Marketing Lead

Michael leads IBM IAM’s product marketing efforts. He brings over two decades of product management and marketing expertise to this role. Prior to IBM, Michael led marketing for a start-up company in the endpoint detection and response market, product management for Fiserv’s fraud detection solutions, and product marketing for BMC software’s enterprise application integration solutions.

Written By Michael Bunyard

Four Ways IDaaS Can Help You Overcome Cloud Identity Hurdles

An investment in IDaaS solutions can help organizations overcome common cloud identity challenges related to infrastructure support, specialized staffing, consistent deployments and maintenance.

IBM, a Leader Again in the 2018 Gartner Magic Quadrant for IGA

IBM was recently named a Leader, again, in Gartner's 2018 Magic Quadrant for Identity Governance and Administration (IGA).

Establishing Trust With Identity Governance Intelligence

An identity governance solution that presents advanced analytics in plain business language is the key to establishing trust between IT and security teams and line-of-business managers.

Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats

Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats.

Secure and Seamless? Building Great Consumer Experiences With Silent IAM

With silent IAM solutions, LOB executives and security professionals can verify and protect user identities without hindering the customer experience.

Secure Your Business Silently With Unified Identity and Access Management

Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.

Let Silent Security Drive Your Identity and Access Management

IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

To protect corporate data from insider threats, security teams should leverage cognitive-enabled UBA and IGI solutions to measure users' risk scores.