Showing documents 41 to 50 of 147  Previous  Next

Results per page: 5 | 10 | 20


cover image

A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On
Security

Redpaper, published 16 Feb 2012

IBM® Security Access Manager for Enterprise Single Sign-On introduces a new level of security, authentication, and automation experience to business enterprise users on their desktop applications. On a day-to-day basis, the number of resources or applications that a business user accesses varies and is inevitably increasing. Applications that a user employs during normal daily activities might require a range of elements to authenticate or verify the user’s identity before granting access to corporate information. The classic authentication approach is the unique user name and password ... [more]


cover image

Set Up Security and Integration with the DataPower XI50z for zEnterprise
Application Integration

Redbooks, published 20 Dec 2011

This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that bridges the gap between mainframe and distributed. The DataPower XI50z (a multifunctional appliance) within the zEnterprise BladeCenter® Extension (zBX) is managed with a single point of control, which can help to streamline operations and maintenance. The DataPower XI50z simplifies the translation of your existing formats to XML (hardware acceleration) for easier communication and connectivity. This book will help you install, tailor, and configure the new attributes ... [more]


cover image

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
Security

Redbooks, published 2 Dec 2011, last updated 16 Dec 2011

Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats ... [more]


cover image

Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On
Security

Redpaper, published 15 Dec 2011

IBM® Tivoli® Access Manager for Enterprise Single Sign-On automates sign-on and access to enterprise applications, eliminating the need to remember and manage user names and passwords. Users log on to Tivoli Access Manager for Enterprise Single Sign-On with a special user ID and password, and then, when they access their secured applications, the Tivoli Access Manager for Enterprise Single Sign-On agent enters their stored credentials automatically without the users needing to do so. Tivoli Access Manager for Enterprise Single Sign-On provides the usual features associated with password ... [more]


cover image

Security on IBM z/VSE
z Systems

Redbooks, published 19 Nov 2011

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent—they could have been using resources without the business even being ... [more]


cover image

Setup and Configuration for IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 for Single-Server and Cluster Environments
Security

Redpaper, published 24 Nov 2010, last updated 7 Nov 2011

This IBM® Redpaper™ publication covers the detailed step-by-step installation of IBM Tivoli® Access Manager for Enterprise Single Sign-On 8.1 onto a single-server and a clustered environment. This paper supplements the IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Installation Guide and IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Setup Guide. Do not use this document in isolation. Check the relevant guides in the Tivoli Access Manager for Enterprise Single Sign-On Information Center as you perform the install. There might be various reasons to install Tivoli ... [more]


cover image

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
Security

Redbooks, published 26 Oct 2011

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security ... [more]


cover image

IBM Security Key Lifecycle Manager for z/OS: Deployment and Migration Considerations
Security

Redpaper, published 7 Oct 2011

This IBM® Redpaper™ publication discusses IBM Security Key Lifecycle Manager (ISKLM) for IBM z/OS® V1.1 and includes topics that discuss encryption capabilities, installation considerations, keystores, auditing, troubleshooting, and migration considerations. We also discuss common practices for key management and provide a sample REXX code procedure for exporting a data key. IBM Security Key Lifecycle Manager for z/OS manages encryption keys for storage, simplifying deployment and maintaining availability to data at rest natively on the System z mainframe environment. Security Key Lifecycle ... [more]


cover image

z/OS Identity Propagation
z Systems

Redbooks, published 29 Sep 2011

This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This ... [more]


cover image

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Security

Redbooks, published 18 Aug 2011

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks