IBM Security Access Manager (ISAM) enables secure information sharing with trusted business partners, contractors, and customers. With the latest appliances, ISAM offers businesses the ability to securely adopt web, mobile and cloud technologies to greatly improve TCO and manageability. Blue Bay is observing a heightened interest in the adaptive authentication capabilities of ISAM, and is currently assessing several strong authentication vendors to use with the ISAM framework in the fight against the use of stolen credentials. Additionally, as new API-centric architectures begin to emerge, we see ISAM filling the authentication requirements, with IBM Datapower and ABAC solutions from Axiomatics filling out the security architecture.
Blue Bay has three broad sets of offerings - Advisory, Implementation, and Product Resale. “We perform security assessments for our clients in order to gain an understanding of their security posture and their business objectives, and then make recommendations on the appropriate security controls,” points out Weinzetl.
We perform security assessments for our clients in order to gain an understanding of their security posture and their business objectives, and then make recommendations on how to implement the appropriate security controls
Weinzetl believes the threat management market is adapting to tackle emerging business drivers related to compliance and the increasing sophistication of attacks. “Over the last five years, the market has moved to respond to massive breaches, underscoring the lack of critical security controls covering ongoing management and upkeep of complex security systems,” says Weinzetl.
Standing apart from competitors, the company delivers security solutions that provide real-world benefits and empowers clients with fast, actionable reporting, followed by risk-based decision-making processes. Forging ahead, Blue Bay will continue to drive the convergence of IAM and Threat Management, providing solutions to embrace this integration. “It is not just about integration, but it includes analytics, intelligence, and innovation to provide next-generation security strategies,” concludes Weinzetl.