Securing Your Mobile Business with IBM Worklight Securing Your Mobile Business with IBM Worklight

Securing Your Mobile Business with IBM Worklight

Publisher Description

The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle.

This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives.

The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it.

This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®.

This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.

GENRE
Computing & Internet
RELEASED
2013
7 November
LANGUAGE
EN
English
LENGTH
370
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
8.4
MB
CICS and DevOps: What You Need to Know CICS and DevOps: What You Need to Know
2016
Who Knew You Could Do That with RPG IV? Modern RPG for the Modern Programmer Who Knew You Could Do That with RPG IV? Modern RPG for the Modern Programmer
2018
Professional Microsoft SQL Server 2008 Integration Services Professional Microsoft SQL Server 2008 Integration Services
2011
Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between
2015
Systems of Insight for Digital Transformation: Using IBM Operational Decision Manager Advanced and Predictive Analytics Systems of Insight for Digital Transformation: Using IBM Operational Decision Manager Advanced and Predictive Analytics
2015
Professional ASP.NET Design Patterns Professional ASP.NET Design Patterns
2010
Storage and Network Convergence Using FCoE and iSCSI Storage and Network Convergence Using FCoE and iSCSI
2014
Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
IBM Technical Computing Clouds IBM Technical Computing Clouds
2013
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014