charismathics Working With IBM To Enable Single Sign-On For Tivolicharismathics Working With IBM To Enable Single Sign-On For Tivoli
Relationship leverages charismathics Smart Security Interface (CSSI)
April 23, 2009
SAN FRANCISCO --(Business Wire)-- Apr 22, 2009 charismathics today announced they are working with IBM through their Tivoli Access Manager for Enterprise Single-Sign-On business partner network. This relationship allows IBM to support Single Sign-On for end-users through the Tivoli framework, by leveraging charismathics CSSI (charismathics Smart Security Interface).
"charismathics extends IBM's commitment to enterprise security solutions that provide the best value, and most flexibility to our customers. charismathics is a leader in enabling enhanced unified security architectures to a range of enterprise clients and individual users. We look forward to leveraging charismathics proven expertise to provide the best solutions to IBM customers," said E.K. Koh, Program Director, Single Sign On, IBM Tivoli software.
For the last three years charismathics and formerly Encentuate, (now part of IBM) have partnered to support Singapore's national government ID project. This project utilized CSSI to address complex requirements for this local e-citizen ID market. The deployment integrated IBM's Tivoli Access Manager Enterprise Single Sign On and charismathics' USB cryptographic tokens embedded with flash memory to authenticate and store passwords.
Additionally, both companies are developing a fully featured demo for IBM's field sales team to show their Tivoli Access Manager Enterprise Single Sign On product integrated with charismathics' CSSI. This demo will allow IBM's sales team to demonstrate Tivoli Access Manager Enterprise Single Sign On with smart cards and tokens in a PKI environment. The aim of this demonstration is to educate the market on this solution's ease of use. CSSI adds value and flexibility by allowing a variety of tokens to be used in a PKI environment without the installation and maintenance hassles of the past. This in turn decreases the complexity of the overall system architecture and leverages a horizontal integration long needed by the market.
CSSI is a cost-effective, smart card independent middleware, which allows for seamless integration with all major pre-boot authentication systems and all major PKI and standard interfaces. CSSI is hardware agnostic and adds flexibility to the procurement cycle by separating hardware decisions from the software selections.
"We are proud to collaborate with IBM, to deliver unprecedented flexibility to enterprise security clients. Moving forward, our middleware will allow IBM customers to easily support tokens, smart cards, and other authentication devices in a PKI environment to support Single Sign-On." said Sven Gossel, CEO of charismathics. "Our teaming together will result in reduced total cost of ownership and optimized security infrastructures for both IBM and charismathics customers."
charismathics is a global leader in identity management software. Its premier product, the charismathics Smart Security Interface (CSSI), makes it cost-effective and easy for enterprises to integrate multiple authentication solutions into a single, transparent interface. Since 2003, charismathics has pioneered the field of Public Key Infrastructure (PKI), introducing the first PKI client to support Trusted Platform Modules (TPM) and the first PKI client to support pre-boot environments. charismathics' iEnigma software secures handheld devices such as the iPhone and iPod Touch and provides streamlined two-factor authentication for the enterprise. charismathics offers security products and PKI consulting in a variety of industries including banking and finance, healthcare, telecommunications, security, government and PC manufacturing. For more information, visit www.charismathics.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report
Business Buyers Guide to Password Managers