Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Publisher Description

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging.

The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges.

In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution.

This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.

GENRE
Computers & Internet
RELEASED
2012
August 22
LANGUAGE
EN
English
LENGTH
422
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
6
MB

More Books Like This

Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
WebSphere Application Server V8.5 Concepts, Planning, and Design Guide WebSphere Application Server V8.5 Concepts, Planning, and Design Guide
2013
Mastering System Center 2012 Configuration Manager Mastering System Center 2012 Configuration Manager
2012
IBM QRadar Version 7.3 Planning and Installation Guide IBM QRadar Version 7.3 Planning and Installation Guide
2018
System Administration Guide for MicroStrategy 10 System Administration Guide for MicroStrategy 10
2015

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009

Customers Also Bought

IBM PowerVM Virtualization Introduction and Configuration IBM PowerVM Virtualization Introduction and Configuration
2017
IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers
2019
The InfoSec Handbook The InfoSec Handbook
2014
Managing Risk and Information Security Managing Risk and Information Security
2013
Microsoft Azure Essentials Azure Automation Microsoft Azure Essentials Azure Automation
2015
20 Windows Tools Every SysAdmin Should Know 20 Windows Tools Every SysAdmin Should Know
2013