Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Description de l’éditeur

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever.

This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security.

To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs.

This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

GENRE
Informatique et Internet
SORTIE
2014
6 février
LANGUE
EN
Anglais
LONGUEUR
240
Pages
ÉDITIONS
IBM Redbooks
TAILLE
2,4
Mo

Plus de livres par IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Security for Linux on System z Security for Linux on System z
2013
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013
Performance and Capacity Implications for Big Data Performance and Capacity Implications for Big Data
2014
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013

D’autres ont aussi acheté

IBM Technology for Java Virtual Machine in IBM i5/OS IBM Technology for Java Virtual Machine in IBM i5/OS
2007
IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale
2019
IBM PowerVM Virtualization Introduction and Configuration IBM PowerVM Virtualization Introduction and Configuration
2017
Getting Started with IBM API Connect: Scenarios Guide Getting Started with IBM API Connect: Scenarios Guide
2016
z/VM and Linux on IBM System z: The Virtualization Cookbook for SLES9 z/VM and Linux on IBM System z: The Virtualization Cookbook for SLES9
2006
IBM Solutions for Hybrid Cloud Networking Configuration Version 1 Release1 IBM Solutions for Hybrid Cloud Networking Configuration Version 1 Release1
2019