IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

    • 2.0 • 1 Rating

Publisher Description

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting.

In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

GENRE
Computers & Internet
RELEASED
2010
July 16
LANGUAGE
EN
English
LENGTH
464
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
7.8
MB

More Books Like This

Deployment Guide for InfoSphere Guardium Deployment Guide for InfoSphere Guardium
2015
Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
2010
IBM Intelligent Operations Center for Smarter Cities Administration Guide IBM Intelligent Operations Center for Smarter Cities Administration Guide
2012
IBM QRadar Version 7.3 Planning and Installation Guide IBM QRadar Version 7.3 Planning and Installation Guide
2018
Incident Response & Computer Forensics, Third Edition Incident Response & Computer Forensics, Third Edition
2014
IBM Tivoli Storage Productivity Center Beyond the Basics IBM Tivoli Storage Productivity Center Beyond the Basics
2017

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013

Customers Also Bought

The InfoSec Handbook The InfoSec Handbook
2014
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
2011
Managing Risk and Information Security Managing Risk and Information Security
2013
Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
2017
Information Security Management - ITP 370 Information Security Management - ITP 370
2014
Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking
2015