IBM Security Access Manager for Enterprise Single Sign-On (previously known as IBM Tivoli Access Manager for Enterprise Single Sign-On or TAM ESSO) is an access management solution that enables users to log into all of their applications with a single password. Security Access Manager for Enterprise Single Sign-On automatically tracks and audits user access to information, so compliance reporting is also simplified. It can help organizations reduce costs, strengthen security, improve productivity and address compliance requirements by removing the frustration of multiple passwords and eliminating complex password management policies.
Security Access Manager for Enterprise Single Sign-On provides single sign-on to most application types and across enterprise network access points, such as physical and virtual desktops, shared kiosks, Citrix servers, and web portals. Security Access Manager for Enterprise Single Sign-On extends single sign-on to different environments with session management, including support for shared (kiosk), roaming and virtual desktops, for improved user efficiency and application security.
IBM Security Access Manager for Enterprise Single Sign-On V8.2 offers wide platform coverage, strong authentication enhancements, and simple deployments. It introduces 64-bit operating system and application support, a virtual appliance for easier installation and delivery of the server, and expanded support for smart cards.
The product’s support for strong authentication devices such as smart cards, biometrics, and access badges can help organizations address government and industry regulations and protect access to sensitive information. Organizations can mitigate potential threats to security and achieve compliance by eliminating inadequate password protection practices.
IBM Security Access Manager for Enterprise Single Sign-On V8.2 is available in four packages: Standard, Suite, Standard (virtual appliance), and Suite (virtual appliance).
Security Access Manager for Enterprise Single Sign-On also integrates with IBM Tivoli Identity Manager for user provisioning to provide an integrated identity and access management solution for organizations.
As of April 2012, IBM Security Access Manager for Enterprise Single Sign-On offers support for Epic Software applications http://www.epic.com/software-index.php (link resides outside of ibm.com) through a no-cost adapter from IBM. The adapter is designed to provide users with faster time to information and greater productivity through seamless single sign-on. Used in combination with RFID building access badges, the adapter allows clinicians to tap in with their badge and get instant access to Epic on their desktops or kiosks. IBM Security Access Manager for Enterprise Single Sign On also contributes to healthcare organizations' efficiency by demonstrating HIPAA compliance via fine-grained audit logs and centralized auditing and reporting capabilities, as well as comprehensive session management for kiosk or shared workstation environments.
|Single sign-on and sign-off||Easily access needed applications (Web, desktop, or legacy)||Improve employee productivity|
|Virtual appliance||Simplifies configuration and deployment of system||Faster time to value|
|Integrated password self-service||Reduce the number of password related calls made to the Help Desk||Decrease IT Help Desk costs|
|Integrated with the widest choice of two-factor authentication devices and support for unattended workstations||Second factor authentication and flexible desktop protection policies||Secure information access|
|Supports personal and kiosk workstations, Citrix, terminal services, Web/portals and thin clients||Comprehensive coverage of access points||Consistent experience to users|
|Support for HIPAA, Sarbanes-Oxley, GLBA, California SB 1386 and Basel II||User centric access tracking of all single sign-on events||Improve audit reporting|
|Implementation at a user, group, or application level||Efficient and centralized management of security and password policies||Reduce administration costs|
|Implement without modifications to the existing IT infrastructure and with minimal training requirements||Easy integration and fast deployment||Fast time to value|
|Automation of application launch, single sign-on, user switching, drive mapping, single sign-off, and more||Automation of access workflows||Fast access to information|
|Configurable screen locks, application logout policies, graceful unlock, and more||Automation of walk-off security policies||Improve security|