Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions

Enterprise Security Architecture Using IBM Tivoli Security Solutions

    • 5.0 • 1 Rating

Publisher Description

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.

This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

GENRE
Computers & Internet
RELEASED
2007
August 7
LANGUAGE
EN
English
LENGTH
1,070
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
11.2
MB
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
2007
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
DataPower SOA Appliance Administration, Deployment, and Best Practices DataPower SOA Appliance Administration, Deployment, and Best Practices
2011
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
2008
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers
2019
Building Cloud Apps with Microsoft Azure Building Cloud Apps with Microsoft Azure
2014
Managing Risk and Information Security Managing Risk and Information Security
2013
Microsoft Azure Essentials Azure Automation Microsoft Azure Essentials Azure Automation
2015
The Basics of User Experience Design by Interaction Design Foundation The Basics of User Experience Design by Interaction Design Foundation
2018