IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

    • 2.0 • 1 Rating

Publisher Description

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting.

In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

GENRE
Computers & Internet
RELEASED
2010
July 16
LANGUAGE
EN
English
LENGTH
464
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
7.8
MB
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014
CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
2023
Administration: Configuration and Security Administration: Configuration and Security
2013
Microsoft System Center Microsoft System Center
2013
Liberty in a DevOps Continuous Delivery Environment Liberty in a DevOps Continuous Delivery Environment
2015
IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile
2015
IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation
2015
Systems of Insight Overview Systems of Insight Overview
2015
Enabling IBM MQ Messaging with the IBM MQ Appliance Enabling IBM MQ Messaging with the IBM MQ Appliance
2015
Using Liberty for DevOps, Continuous Delivery, and Deployment Using Liberty for DevOps, Continuous Delivery, and Deployment
2015
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
2011
The InfoSec Handbook The InfoSec Handbook
2014
Security in Computer and Information Sciences Security in Computer and Information Sciences
2018
Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
2017
Information Security Management - ITP 370 Information Security Management - ITP 370
2014
Managing Risk and Information Security Managing Risk and Information Security
2013