IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

Opis wydawcy

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting.

In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

GATUNEK
Komputery i Internet
WYDANO
2010
16 lipca
JĘZYK
EN
angielski
DŁUGOŚĆ
464
Liczba stron
WYDAWCA
IBM Redbooks
WIELKOŚĆ
7,8
MB

Więcej książek autorstwa: IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Business Process Management Design Guide: Using IBM Business Process Manager Business Process Management Design Guide: Using IBM Business Process Manager
2015
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012

Użytkownicy kupili także

Information Security Management - ITP 370 Information Security Management - ITP 370
2014
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
IPv6 is Easy IPv6 is Easy
2013
OSI 7 Layer Model OSI 7 Layer Model
2012
Cyber Security: It's Personal Cyber Security: It's Personal
2017
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012