IBM Security Key Lifecycle Manager

IBM Corporation has achieved a strong brand name in offering various technological products, solutions, and services across the region. The company’s major business segment includes technology services, cognitive solutions, global business services, system, and global financing. The company also offers a robust product portfolio in numerous segments such as analytics, cloud, IoT, mobile, and security. It also offers consulting services and managed services in security space to its commercial clients. IBM offers its products and solutions to various industry verticals such as automotive, aerospace and defense, government, banking, healthcare, finance, IT and telecom, Banking, Financial Services, and Insurance (BFSI), consumer products, and retail in over 175 countries to its clientele. Furthermore, the company has established a strong channel partner ecosystem through partnerships around the globe.

USP : IBM offers a wide range of products and solutions in security market space. Some of the featured security solutions offered by IBM include security intelligence and analytics, advanced fraud protection, identity and access management, data security and privacy, application security, and infrastructure protection.IBM Security Key Lifecycle Manager platform offers a full range of security capabilities including vulnerability assessment of data, encryption, blocking, alerting, and securing sensitive data to its commercial clients. IBM Security Key Lifecycle Manager offers automated analysis of external and internal risk related to data. The IBM Security solutions develop a holistic secured environment at a low cost with advanced service and easily manageable risks. IBM provides solution for securing data with advanced feature of safeguarding it despite of the location of data. In the enterprise key management market, the company offers IBM security key lifecycle manager formerly known as Tivoli key lifecycle manager. This solution offers centralized, automated process to encrypt data for securing it from attacks. Additionally, it offers secure and robust storage for keys and also helps to maintain lifecycle of IBM and Non-IBM keys by using Key Management Interoperability Protocol (KMIP). IBM key life cycle manager can be seamlessly integrated with the IBM storage, helps to reduce maintenance cost, and offers transparent key management. The solution addresses regulations standards such as PCI-DSS, which supports all the rules related to protection of keys and processes managing those keys.

BUYERS
VENDORS
EXPERTS
3.8
ANALYSTS
 

IBM CORPORATION detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
3.25
4.20
4.20
Product Features and Functionality
3.90
5.00
3.90
Delivery
3.55
5.00
5.00
Scalability
2.55
4.20
4.20
Support and Services
4.05
4.05
3.60
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

IBM CORPORATION has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    14 Participants

  • Niche Quadrant

    All-Asia-Pacific

    17 Participants

  • Niche Quadrant

    All-Europe

    20 Participants

STRENGTHS
  • Product Maturity / Organization Size
    Large Enterprises
  • Product Maturity / Delivery Models
    Directly
  • Product Maturity / Deployment Model
    Hosted
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Solutions Offered
    Laptop
  • Product Maturity / Solutions Offered
    Mobile
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Solutions Offered
    Pad
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity / Applications Served
    Cloud Encryption
  • Product Maturity / Applications Served
    Communication Encryption
  • Product Maturity / Applications Served
    Database Encryption
  • Product Maturity
    Delivery
  • Product Maturity / Applications Served
    Disk Encryption
  • Product Maturity / Applications Served
    File/Folder Enryption
  • Product Maturity
    Product Features and Functionality
  • Product Maturity
    Scalability
  • Product Maturity
    Support and Services
  • Product Maturity / End Users
    Aerospace & Defence
WEAKNESSES
  • Product Maturity / Organization Size
    SMEs
  • Product Maturity / Delivery Models
    Through Partners / Third-Party Vendors
  • Product Maturity / Solutions Offered
    Other devices supported by the solution
  • Product Maturity / Pre Sales Support
    Proof of Concept
  • Product Maturity / services
    Managed Services
  • Product Maturity / Support and Services
    Level of Support Services
  • Product Maturity / Scalability
    End Users/Workstations
  • Product Maturity / services
    Professional Services
  • Product Maturity / Breadth and Depth of Product Offerings
    Products Offered
  • Product Maturity / Support and Services
    Customer Support
  • Product Maturity / Pre Sales Support
    Dedicated Account Manager (DAM)
  • Product Maturity / Support and Services
    Others, please specify
  • Product Maturity / Pre Sales Support
    Product Demos
  • Product Maturity / Support and Services
    Sales support
  • Product Maturity / Pre Sales Support
    Software Requirement Specification (SRS)
  • Product Maturity / Support and Services
    Technical Support
  • Product Maturity / End Users
    Others
  • Product Maturity / End Users
    BFSI
  • Product Maturity / End Users
    Energy And Utilities
See More

Have you EVER used IBM CORPORATION Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Applications Served
  • Product Features and Functionality
    Solutions Offered
  • Deployment Model
    On-Premise
  • Support and Services
    Others, please specify
  • End Users
    BFSI
  • End Users
    Healthcare
  • Applications Served
    Database Encryption
  • Organization Size
    Large Enterprises
  • Pre Sales Support
    Dedicated Account Manager (DAM)
  • Applications Served
    Communication Encryption

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

IBM CORPORATION Presence in Enterprise Key Management Software

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

...

Marie Stelle

Engagement Partner - 360Quadrants.com