IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint

IBM Security Solutions Architecture for Network, Server and Endpoint

Publisher Description

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those threats are there. Threats would not be harmful if there were no vulnerabilities that could be exploited. With IT environments becoming more complex every day, the challenges to keep an eye on all potential weaknesses are skyrocketing.

Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and remediation, become necessary to counter a growing number of attacks against networks, servers, and endpoints in every organization.

In this IBM® Redbooks® publication, we examine the aspects of the holistic Threat and Vulnerability Management component in the Network, Server and Endpoint domain of the IBM Security Framework. We explain the comprehensive solution approach, identify business drivers and issues, and derive corresponding functional and technical requirements, which enables us to choose and create matching security solutions.

We discuss IBM Security Solutions for Network, Server and Endpoint to effectively counter threats and attacks using a range of protection technologies and service offerings. Using two customer scenarios, we apply the solution design approach and show how to address the customer requirements by identifying the corresponding IBM service and software products.

GENRE
Computing & Internet
RELEASED
2011
17 February
LANGUAGE
EN
English
LENGTH
510
Pages
PUBLISHER
IBM Redbooks
SIZE
7.1
MB

More Books Like This

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014
CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003) CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003)
2019

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009

Customers Also Bought

Creating a Trusted Network for Homeland Security Creating a Trusted Network for Homeland Security
2012
IBM PowerVM Virtualization Introduction and Configuration IBM PowerVM Virtualization Introduction and Configuration
2017
Protecting Virtual Datacenters Protecting Virtual Datacenters
2012
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Microsoft System Center Data Protection for the Hybrid Cloud Microsoft System Center Data Protection for the Hybrid Cloud
2015
Administration: Configuration and Security Administration: Configuration and Security
2013