Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

    • 5.0 • 2 calificaciones

Descripción editorial

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever.

This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security.

To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs.

This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

GÉNERO
Informática e Internet
PUBLICADO
2014
6 de febrero
IDIOMA
EN
Inglés
EXTENSIÓN
240
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
2.4
MB
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022
Rational Cybersecurity for Business Rational Cybersecurity for Business
2020
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
2024
CISO Desk Reference Guide CISO Desk Reference Guide
2019
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
Cyber Resiliency Solution using IBM Spectrum Virtualize Cyber Resiliency Solution using IBM Spectrum Virtualize
2021
IBM Spectrum Scale: Big Data and Analytics  Solution Brief IBM Spectrum Scale: Big Data and Analytics  Solution Brief
2019
Introduction to the New Mainframe: IBM z/VSE Basics Introduction to the New Mainframe: IBM z/VSE Basics
2016
IBM Storage for Red Hat OpenShift Blueprint IBM Storage for Red Hat OpenShift Blueprint
2020
Microsoft System Center Software Update Management Field Experience Microsoft System Center Software Update Management Field Experience
2015
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012