Automate security scans and auditing of your servers and desktop systems with the Tivoli Security Compliance Manager. This software tools enables the deployment of best-practices with out-of-the-box polices and boilerplate reports that are include with Tivoli Security Compliance Manager. This autonomic software enables enterprises to quickly and proactively respond to security vulnerabilities before they affect the business.
This tool enables enterprises to centrally manage identities throughout the enterprise and user life cycle. Tivoli Identity Manager is a security-rich, automated, policy based management solution that allows you to delegate administrative privileges and management tasks from a unified, intuitive web interface.
Support broad federation functionality with rich security administration and single sign-on capabilities with Tivoli Federated Identity Manager. Your enterprise can eliminate redundancies and the need for users to have different usernames and passwords to sign into different enterprise applications.
Tivoli Federated Identity Manager Business Gateway is an entry-level single sign-on tool for smaller enterprises that need to connect to larger enterprises and online partners for various business initiatives. Configuration is easy, allowing for rapid deployment in a small infrastructure footprint.
Tivoli Access Manager for eBusiness is a flagship security solution for the authentication & authorization of all of your applications, including web-based ones, across multiple platforms such as WebSphere™, Microsoft® .NET & BEA.
Users won’t have to remember multiple usernames and passwords with Tivoli Access Manager for Enterprise Single Sign-On. This ESSO (enterprise single sign-on) solution allows employees to be authenticated once, and automatically responds to various password-related sign-ons.
This specialized tool is designed specifically to provide multi-platform security for WebSphere MQ-based applications. It includes message-level auditing for security compliance audits, and centralizes administration of access control and data protection policies. This solution can be deployed without having to re-code or re-design any of the applications as well.