IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

Beschreibung des Verlags

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation.

First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance.

In this IBM® Redbooks® publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss.

This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.

GENRE
Computer und Internet
ERSCHIENEN
2011
26. Oktober
SPRACHE
EN
Englisch
UMFANG
314
Seiten
VERLAG
IBM Redbooks
GRÖSSE
2.7
 MB
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Combining Business Process Management and Enterprise Architecture for Better Business Outcomes Combining Business Process Management and Enterprise Architecture for Better Business Outcomes
2011
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
IBM PowerVM Best Practices IBM PowerVM Best Practices
2015
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014
IBM SmartCloud: Building a Cloud Enabled Data Center IBM SmartCloud: Building a Cloud Enabled Data Center
2013
The InfoSec Handbook The InfoSec Handbook
2014
Cyber Security Cyber Security
2019
Finance: Cloud Computing, Cyber Security and Cyber Heist Finance: Cloud Computing, Cyber Security and Cyber Heist
2015
20 Windows Tools Every SysAdmin Should Know 20 Windows Tools Every SysAdmin Should Know
2013
Cyber Security: It's Personal Cyber Security: It's Personal
2017
Cyber Security Cyber Security
2021