Showing documents 41 to 50 of 120  Previous  Next

Results per page: 5 | 10 | 20


cover image

Enhancing Password Management by Adding Security, Flexibility, and Agility
Security

Solution Guide, published 7 Dec 2012

The number of logins and passwords that employees must manage on a daily basis continues to be a source of frustration and lost productivity. Employees must remember login information for numerous applications. Many of these applications require different user names and passwords, different password complexity requirements, and forced password changes in shorter intervals. The number of logins that an employee must manage grows with the deployment of each additional business application. The corporate help desk often endures the process of restoring lost or forgotten login information for an ... [more]


cover image

A Sweeping Approach to Security
IBM Z

Point-of-View, published 29 Nov 2012, last updated 29 Nov 2012

Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be protected. Consequently, organizations increasingly need to implement a smarter approach that relies on fine-grained control of access privileges and far field detection of potential and seemingly unrelated threats. Such an approach must also rely on multitier containment methods to isolate intrusions and to minimize damage. To adopt a broad security approach ... [more]


cover image

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
Security

Redbooks, published 11 Sep 2012

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for ... [more]


cover image

RACF Remote Sharing Facility over TCP/IP
IBM Z

Redbooks, published 30 Aug 2012

The IBM RACF® remote sharing facility (RRSF) allows RACF to communicate with other IBM z/OS® systems that use RACF, allowing you to maintain remote RACF databases. RRSF support for the security administrator provides these benefits:

  • Administration of RACF databases from anywhere in the RRSF network
  • Creation of User ID associations for password and password phrase synchronization
  • Automatic synchronization of databases
    Before to z/OS V1R13, RRSF only supported the APPC protocol. With z/OS release V1R13, TCP/IP can be used to extend the RACF Remote Sharing Facility ... [more]


  • cover image

    Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
    Security

    Redbooks, published 22 Aug 2012

    Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage ... [more]


    cover image

    Integrating IBM Security and SAP Solutions
    Security

    Redbooks, published 23 Feb 2012, last updated 19 Mar 2012

    Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM ... [more]


    cover image

    A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On
    Security

    Redpaper, published 16 Feb 2012

    IBM® Security Access Manager for Enterprise Single Sign-On introduces a new level of security, authentication, and automation experience to business enterprise users on their desktop applications. On a day-to-day basis, the number of resources or applications that a business user accesses varies and is inevitably increasing. Applications that a user employs during normal daily activities might require a range of elements to authenticate or verify the user’s identity before granting access to corporate information. The classic authentication approach is the unique user name and password ... [more]


    cover image

    Set Up Security and Integration with the DataPower XI50z for zEnterprise
    Application Integration

    Redbooks, published 20 Dec 2011

    This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that bridges the gap between mainframe and distributed. The DataPower XI50z (a multifunctional appliance) within the zEnterprise BladeCenter® Extension (zBX) is managed with a single point of control, which can help to streamline operations and maintenance. The DataPower XI50z simplifies the translation of your existing formats to XML (hardware acceleration) for easier communication and connectivity. This book will help you install, tailor, and configure the new attributes ... [more]


    cover image

    Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
    Security

    Redbooks, published 2 Dec 2011, last updated 16 Dec 2011

    Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats ... [more]


    cover image

    Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On
    Security

    Redpaper, published 15 Dec 2011

    IBM® Tivoli® Access Manager for Enterprise Single Sign-On automates sign-on and access to enterprise applications, eliminating the need to remember and manage user names and passwords. Users log on to Tivoli Access Manager for Enterprise Single Sign-On with a special user ID and password, and then, when they access their secured applications, the Tivoli Access Manager for Enterprise Single Sign-On agent enters their stored credentials automatically without the users needing to do so. Tivoli Access Manager for Enterprise Single Sign-On provides the usual features associated with password ... [more]


     Previous  Next

    The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



    Follow IBM Redbooks

    Follow IBM Redbooks