Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions

Enterprise Security Architecture Using IBM Tivoli Security Solutions

Publisher Description

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.

This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

GENRE
Computing & Internet
RELEASED
2007
7 August
LANGUAGE
EN
English
LENGTH
1,070
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
11.2
MB
CCNSP-NP CCNSP-NP
2013
CompTIA Security+ SY0-301 Authorized Exam Cram, 3/e CompTIA Security+ SY0-301 Authorized Exam Cram, 3/e
2011
Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition
2014
Microservices from Theory to Practice: Creating Applications in IBM Bluemix Using the Microservices Approach Microservices from Theory to Practice: Creating Applications in IBM Bluemix Using the Microservices Approach
2016
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
IBM Cognos Business Intelligence V10.1 Handbook IBM Cognos Business Intelligence V10.1 Handbook
2010
Developing Node.js Applications on IBM Cloud Developing Node.js Applications on IBM Cloud
2017
Managing Risk and Information Security Managing Risk and Information Security
2013