Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Publisher Description

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever.

This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security.

To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs.

This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

GENRE
Computing & Internet
RELEASED
2014
6 February
LANGUAGE
EN
English
LENGTH
240
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
2.4
MB

More Books Like This

The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021
CISSP For Dummies CISSP For Dummies
2018
Destination CISSP Destination CISSP
2023
IT Architecture For Dummies IT Architecture For Dummies
2010
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Network Security Bible Network Security Bible
2011

More Books by IBM Redbooks

Storage and Network Convergence Using FCoE and iSCSI Storage and Network Convergence Using FCoE and iSCSI
2014
Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
IBM Technical Computing Clouds IBM Technical Computing Clouds
2013
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014

Customers Also Bought

IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale IBM Hybrid Solution for Scalable Data Solutions using IBM Spectrum Scale
2019
IBM Solutions for Hybrid Cloud Networking Configuration Version 1 Release1 IBM Solutions for Hybrid Cloud Networking Configuration Version 1 Release1
2019
The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3 The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3
2016
IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1 IBM Storage for Red Hat OpenShift Container Platform V3.11 Blueprint Version 1 Release 1
2019
IBM PowerVM Virtualization Introduction and Configuration IBM PowerVM Virtualization Introduction and Configuration
2017
Cyber Resiliency Solution for IBM Spectrum Scale Cyber Resiliency Solution for IBM Spectrum Scale
2019