IBM Security Access Manager Appliance Deployment Patterns IBM Security Access Manager Appliance Deployment Patterns

IBM Security Access Manager Appliance Deployment Patterns

Descripción editorial

IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on several popular hypervisors. The integrated appliance form factor enables easier and more flexible deployment and maintenance.

This IBM Redpaper™ publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes various deployment considerations, such as networking, high-availability, performance, disaster recovery, and scalability. All of these deployment patterns are covered within the context of realistic business scenarios.

This paper is especially helpful to Security Access Manager architects and deployment specialists.

GÉNERO
Informática e Internet
PUBLICADO
2015
2 de noviembre
IDIOMA
EN
Inglés
EXTENSIÓN
90
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
1.4
MB
IBM WebSphere Application Server Liberty Profile Guide for Developers IBM WebSphere Application Server Liberty Profile Guide for Developers
2015
IBM DS8870 Copy Services for Open Systems IBM DS8870 Copy Services for Open Systems
2015
Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2 Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2
2015
Guide to IBM PowerHA SystemMirror for AIX Version 7.1.3 Guide to IBM PowerHA SystemMirror for AIX Version 7.1.3
2015
IBM Tivoli Storage Manager as a Data Protection Solution IBM Tivoli Storage Manager as a Data Protection Solution
2014
Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer
2015