Skip to main content

Ready for IBM Security Intelligence


Validate your solution integration against IBM Security products. Each of the following tracks provides information and resources to assist you with your product integration options. The integrated solution examples for each track show the types of solutions offered by Business Partners.

Security intelligence and analyticsSecurity intelligence and analytics

IBM security intelligence solutions harness the security-relevant information across your organization, applying advanced intelligence to help you detect threats faster, prioritize risks more effectively, and automate compliance activities.

  • - IBM Security products

    QRadar Log Manager and QRadar SIEM

    The IBM Security intelligence and analytics track describes the integration of security events, assets, vulnerabilities, and configuration information to the QRadar Security Intelligence platform. This track also helps provide a higher level of integration, pre-release updates of events, and joint troubleshooting between vendors.

    The vendor relationship helps to create an engineering, support, and product level connection where they can share information for the benefit of our joint customers. This connection encourages product vendors to write and update setup documentation, establish fast and efficient data feeds, and engage in joint testing and training between vendors.

    In many cases, there is bi-directional integration between products and even multiple integration points between products.

    With our Business Partners, we are able to deliver more powerful correlation across the security data because our IBM Security Intelligence and Analytics community have integrated their products with enhanced formats for data transfer including:

    These are the most common forms of integration with QRadar. Other integration opportunities can also be investigated during the validation process.

    Depending on your type of integration, you and IBM will use the following documentation:

    • - Event integration

      Integrate your events with QRadar reporting. You will use your product logs, in LEEF format, as input to this integration. Your IBM integration contact will provide the following documents to assist you with the technical validation:

    • - Asset and vulnerability management integration

      Asset information from scanners, MAC products, topology products, and configuration management databases (CMDBs) are examples of data sources for this type of integration. Your IBM integration contact will provide the following documents to assist you with the technical validation:

  • - Integrated solution examples


IBM Security solutions can help organizations mitigate the risks from unauthorized access and support an effective Identity and Access Management governance strategy.

  • - IBM Security products
    • - Access Manager for Web

      IBM Security Access Manager for Web provides a common security platform for many different application architectures. Use these resources to learn about the most common integration methods that you can use as models for your solution.

      Single sign-on


      Common authorization model

      Authorization services are the core function of the Access Manager. These services can help simplify your development of software that enforces authorization decisions, enabling your application to query the Access Manager authorization service for authorization decisions. At the same time, your application can making use of Access Manager's centralized and delegated policy management capabilities.

    • - Access Manager for Enterprise Single Sign-On

      This IBM Security product delivers a simple, flexible, and complete identity and access management solution at the enterprise end points. It combines enterprise single sign-on with strong authentication, audit, and compliance services, while integrating seamlessly with provisioning and directory services with no change to your existing infrastructure.

      Technical validation with this product involves implementing interoperability with strong authentication solutions with the following possible integrations:

    • - Directory Integrator

      IBM Tivoli Directory Integrator synchronizes identity data residing in directories, databases, collaborative systems, applications used for human resources (HR), customer relationship management (CRM), enterprise resource planning (ERP), and other corporate applications.

      By serving as a flexible, synchronization layer between a company's identity structure and the application sources of identity data, Tivoli Directory Integrator eliminates the need for a centralized data store. For those companies that choose to deploy an enterprise solution, this IBM Security product can help ease the process by connecting to the identity data from the various repositories throughout the organization.

      The following are possible integration methods and interfaces:

    • - Federated Identity Manager

      IBM Tivoli Federated Identity Manager provides the necessary framework to support standards-based, federated identity management between enterprises that have established a trust relationship. This product provides capabilities in the areas of federated single sign-on, web services security management, and identity management for service-oriented architecture (SOA) components across the enterprise.

      Tivoli Federated Identity Manager provides a number of custom extension points that enable third parties to implement their own logic for various features. These include, but are not limited to, the following modules:

    • - Identity Manager

      The IBM Security Identity Manager server has a layered, modular design that is composed of:

      There are many possible integration methods since IBM Security Identity Manager provides a common Identity Management platform for different application architectures:

  • - Integrated solution examples


IBM can help you establish a holistic approach to secure structured, unstructured, online, and offline data across the enterprise.

  • - IBM Security products
  • - Integrated solution examples


IBM Application Security solutions can help you deliver and maintain secure mobile and web applications by enabling you to build layers of protection throughout all phases of the development and operations lifecycle.

  • - IBM Security products
    • - AppScan Standard

      Identify, prioritize, track, and remediate critical security vulnerability and compliance demands; help reduce costs associated with manual vulnerability testing; and help to protect against the threat of cyber attack by automating security analysis to detect exploitable vulnerabilities.

    • - AppScan Enterprise

      Get a web application vulnerability testing and reporting solution that goes beyond application security testing to provide a holistic platform for application risk management and governance. This product also provides enterprise-level visibility into application security and regulatory compliance risks.

    • - AppScan Source

      Prevent data breaches by locating security flaws in application source code. AppScan Source automates static analysis security testing to identify and remediate vulnerabilities in source code while helping security and development teams strengthen application security, protect confidential data, and improve compliance.

  • - Integrated solution examples

    You can enhance AppScan Source with domain and programming language specific integrations, such as Advanced Business Application Programming (ABAP) support for SAP, or use the AppScan Enterprise REST API to collate vulnerability information to feed into your web application firewall to mitigate application vulnerabilities on your network.


IBM Infrastructure protection solutions provide in-depth security across your network, servers, virtual servers, mainframes, and endpoints.

  • - IBM Security products
  • - Solution types

    If you are interested in integrating with security products on the infrastructure track, contact

Live Chat is currently unavailable

The Live Chat service is usually available during normal business hours. Use the \"Contact us\" email link to send us an email now.