IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

출판사 설명

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation.

First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance.

In this IBM® Redbooks® publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss.

This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.

장르
컴퓨터 및 인터넷
출시일
2011년
10월 26일
언어
EN
영어
길이
314
페이지
출판사
IBM Redbooks
판매자
International Business Machines Corp
크기
2.7
MB
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
2007년
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007년
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014년
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012년
IBM FileNet P8 Platform and Architecture IBM FileNet P8 Platform and Architecture
2011년
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021년
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006년
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012년
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012년
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011년
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010년
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009년
The InfoSec Handbook The InfoSec Handbook
2014년
Cyber Security Cyber Security
2019년
Finance: Cloud Computing, Cyber Security and Cyber Heist Finance: Cloud Computing, Cyber Security and Cyber Heist
2015년
20 Windows Tools Every SysAdmin Should Know 20 Windows Tools Every SysAdmin Should Know
2013년
Cyber Security: It's Personal Cyber Security: It's Personal
2017년
Cyber Security Cyber Security
2021년