Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions

Enterprise Security Architecture Using IBM Tivoli Security Solutions

    • ٥٫٠ - ١ تقييم

وصف الناشر

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everyone in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Identity Manager, Federated Identity Manager, Security Compliance Manager, Security Operations Manager, Directory Server, and Directory Integrator, Tivoli offers a complete set of products designed to address these challenges.

This book describes the major logical and physical components of each of the Tivoli products. It also depicts several e-business scenarios with different security challenges and requirements. By matching the desired Tivoli security product criteria, this publication describes the appropriate security implementations that meet the targeted requirements.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement enterprise security following architectural guidelines.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٧
٧ أغسطس
اللغة
EN
الإنجليزية
عدد الصفحات
١٬٠٧٠
الناشر
IBM Redbooks
البائع
International Business Machines Corp
الحجم
١١٫٢
‫م.ب.‬
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
٢٠٠٧
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
٢٠١٥
DataPower SOA Appliance Administration, Deployment, and Best Practices DataPower SOA Appliance Administration, Deployment, and Best Practices
٢٠١١
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
٢٠١٦
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
٢٠١٤
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
٢٠٠٨
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
٢٠٠٦
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
٢٠١٢
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
٢٠١٢
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
٢٠١١
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
٢٠١٠
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
٢٠٠٩
Developing Node.js Applications on IBM Cloud Developing Node.js Applications on IBM Cloud
٢٠١٧
Managing Risk and Information Security Managing Risk and Information Security
٢٠١٣