This document discusses building identity-based security into information systems. It argues that most organizations have focused on adding security after the fact, rather than building it in from the start. Today's identity and access management technologies allow building security directly into systems through features like real-time authentication, fine-grained access controls, and linking identity to transactions and information. This approach provides both security benefits and opportunities to optimize business performance. The document examines IBM's identity and access management capabilities as an example of a vendor that can help organizations take a comprehensive, built-in approach to security.