SHARE
Facebook X Pinterest WhatsApp

IBM Opens App Store for Identity Access Management Software

IBM today as part of an effort to make various forms of identity access management (IAM) software more easily accessible, opened an online marketplace through which IT organizations can download multifactor security software from IBM and others. Brian Mulligan, offering manager for Access and Authentication at IBM Security, says the IBM Security App Exchange is […]

Written By
MV
Mike Vizard
Dec 6, 2017

IBM today as part of an effort to make various forms of identity access management (IAM) software more easily accessible, opened an online marketplace through which IT organizations can download multifactor security software from IBM and others.

Brian Mulligan, offering manager for Access and Authentication at IBM Security, says the IBM Security App Exchange is intended to make it simpler for IT security teams to evaluate multiple approaches to multifactor authentication spanning everything from hardware-based tokens, to biometrics. Third-party vendors participating in the IBM Security App Exchange include BuyPass, DualAuth, Imageware and Yubico.

Mulligan says most organizations are going to opt for different approaches based on specific use cases. The IBM Security App Exchange is intended to make it simpler to evaluate various authentication approaches based on their usability, says Mulligan.

“Every approach to multifactor authentication has tradeoffs,” says Mulligan.

In general, Mulligan says, IBM is trying to foster more collaboration across the IT security industry at a time when cybercriminals now regularly collaborate with one another. Almost every successful attack in some form or another involves compromised credentials. That creates a compelling reason for IT security teams to collaborate with one another to implement various forms of multifactor authentication, says Mulligan.

Longer term, Mulligan says advances in machine and deep learning algorithms have a lot of promise when it comes to multifactor authentication. Face recognition software and other forms of biometrics based on machine learning algorithms are already being implemented on smartphones. Deep learning algorithms employed in a cloud service will also soon be able to transparently locate an actual user based on analytics derived from data collected by sensors and historical user behavior.

In the meantime, Mulligan says reliance on traditional passwords to secure applications is clearly problematic. Most end users cannot remember multiple complex passwords required to access hundreds of online services. That makes it incumbent on IT security teams to provide more sophisticated approaches to identity management that are not only more robust, but just as importantly, simple to use.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.