Product Report: IBM Tivoli Identity Manager

Report Details

The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner.

IBM Tivoli Identity Manager supports some integrated Access Governance capabilities beyond classical Identity Provisioning. The focus has shifted from pure provisioning towards the more advanced capabilities around role management, access certification, and SoD policies as well as advanced workflow features. Bundled with IBM TIM is the IBM Tivoli Directory Integrator, which is sort of meta-directory solution which in fact allows connecting to a broad variety of different systems. Based on that approach, IBM can offer a large number of connectors.

The product is based originally on the acquisition of the Access360 product by IBM. IBM was amongst the first large software vendors which entered the Identity Provisioning market. With the release 5.1 of TIM, IBM is back and has a competitive offering again.

We recommend evaluating IBM Tivoli Identity Manager when it comes to decisions about Identity Provisioning products with integrated basic Access Governance capabilities. Beyond that, IBM TIM appears to be a good fit within IT Security strategies, especially when mainly based on IBM products. In these situations, we strongly recommend to include IBM TIM in shortlists for product decisions.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Sep 17, 2010

Product Report: IBM Tivoli Identity Manager

The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner.…

€95.00 Get Access

Latest Related Reports

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 71138

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: IBM QRadar Security Intelligence Platform - 72515

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and breaches, forensic analysis and incident response, as well as automated regulatory compliance.

Executive View

Executive View: IBM Privileged Identity Manager - 71557

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Privilege Management - 71100

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre…

Executive View

Executive View: IBM Cloud Security Enforcer - 71523

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

Leadership Compass

Leadership Compass: Privilege Management - 71100

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management…

Leadership Compass

Leadership Compass: Access Control/Governance für SAP-Umgebungen - 71104

Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen…

Leadership Compass

Leadership Compass: Access Control / Governance for SAP environments - 71104

This report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The importance of consent management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed CIAM [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Digital Finance

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a contractual [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00