Showing documents 61 to 80 of 116  Previous  Next

Results per page: 5 | 10 | 20


cover image

IBM Security Solutions Architecture for Network, Server and Endpoint
Security

Redbooks, published 17 Feb 2011

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those threats are there. Threats would not be harmful if there were no vulnerabilities that could be exploited. With IT environments becoming more complex every day, the challenges to keep an eye on all potential weaknesses are skyrocketing. Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and ... [more]


cover image

Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones
z Systems

Redguide, published 17 Feb 2011

Many customers wanting to do Linux® server consolidation and deployment to IBM® System z® experience challenges in balancing the security of a physical “air gap” with the low cost of consolidation on a single box: It goes against their instincts and training. Being able to understand the security implications, capabilities, advantages, and risks of virtual server consolidation helps to lower or remove barriers to growth and the decision to say “Yes” to System z. This IBM Redpaper™ publication describes the architecture of traditional network security zones (Internet, DMZ, application, ... [more]


cover image

Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance
Security

Redpaper, published 23 Sep 2010

Today, security is a concern for everyone, from members of the board to the data center. Each day another data breach occurs. These incidents can affect an organization's brand, investment return, and customer base. Time spent managing security incidents and managing risks can take time away from focusing on strategic business objectives. Organizations need to address security challenges by administering, securing, and monitoring identities, roles, and entitlements with efficient life-cycle management, access controls, and compliance auditing. Those tasks include automated and policy-based ... [more]


cover image

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
z Systems Software

Redpaper, published 12 Aug 2010

Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent mistakes of privileged users alone can result in millions of dollars in damages through unintentional configuration errors and careless security commands. Malicious users with authorized access can cause even greater damage. As a result, security management faces a serious challenge to adequately protect a company's sensitive data. Likewise, IT staff is ... [more]


cover image

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Security

Redbooks, published 16 Jul 2010

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and ... [more]


cover image

Robust Integration with Tivoli Directory Integrator 7.0
Security

Redpaper, published 1 Jun 2010

What is perfectly acceptable to one person is a potential disaster for another. The concept of availability is closely related to risk tolerance. This document illustrates the options and capabilities that an integration designer can use when planning, developing, and deploying an integration solution using IBM Tivoli® Directory Integrator. The challenges discussed in this IBM® Redpaper™ publication are not unique to Tivoli Directory Integrator, nor are the approaches to mitigate them. However, Tivoli Directory Integrator is an unusually flexible product, and understanding its capabilities ... [more]


cover image

IBM z/OS V1R10 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking
z Systems

Redbooks, published 6 Jul 2009, last updated 26 Apr 2010

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors, providing, among many other capabilities, world-class, state-of-the-art, support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of ... [more]


cover image

Security in Development: The IBM Secure Engineering Framework
Security

Redguide, published 18 Mar 2010

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this can be traced back to the Integrity Statement for IBM mainframe software, originally published in 1973: "IBM’s long-term commitment to System Integrity is unique in the ... [more]


cover image

Identity Management for IBM Cognos 8 with IBM Tivoli Identity Manager
Analytics

Redpaper, published 9 Feb 2010

This IBM® Redpaper™ publication describes how IBM Tivoli® Identity Manager can be used as a comprehensive identity management solution for IBM Cognos® 8. IBM Cognos 8 provides a security architecture that is flexible and compatible with existing security models. It can be integrated with authentication and cryptographic providers. Authentication in IBM Cognos 8 can be integrated with third-party authentication providers, such IBM Tivoli Directory Server, Sun ONE Directory Server, Microsoft® Active Directory server, and so on. IBM Cognos 8 does not create or manage users as it is expected to ... [more]


cover image

Certification Study Guide Series: IBM Tivoli Access Manager for Enterprise Single Sign-On 8.0
Security

Redbooks, published 13 Aug 2009, last updated 8 Jan 2010

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Access Manager for Enterprise Single Sign-On V8.0" certification test, test number 000-020, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Access Manager for Enterprise Single Sign-On Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work with the implementation of the IBM Tivoli Access Manager for Enterprise Single Sign-On ... [more]


cover image

IBM Lotus Domino Integration Using IBM Tivoli Directory Integrator
Security

Redpaper, published 31 Dec 2009

In this IBM® Redpaper™ publication we take you step-by-step through a series of integration scenarios to help you start building your own solutions with IBM Tivoli® Directory Integrator. Once you have mastered basic skills you will quickly be wiring your IBM Lotus® Domino® applications (both the shrink-wrapped and home-grown varieties) more tightly into the infrastructure, and you will also be sharing data between Lotus Domino and other systems more simply and easily than you probably thought was ... [more]


cover image

IBM Tivoli Provisioning Manager V7.1.1: Deployment and IBM Service Management Integration Guide
Security

Redbooks, published 7 Dec 2009

NOTE: THIS PUBLICATION IS AVAILABLE IN SOFTCOPY ONLY. This IBM® Redbooks® publication is a complete reference for the recently available Tivoli® Provisioning Manager V7.1.1 product. This document provides information valuable to those who want to plan for, customize, and use the IBM Tivoli Provisioning Manager V7.1.1 product to automate and manage IT provisioning and integrated IT service management processes in their environments. It includes five parts: Concepts and architecture: Provides an overview of provisioning concepts and introduces Tivoli Provisioning Manager V7.1.1 concepts and ... [more]


cover image

IBM Tivoli Access Manager for e-business: Junctions and Links
Security

Redpaper, published 3 Dec 2009

IBM® Tivoli® Access Manager for e-business can manage and enforce access control to Web-based resources located on Web servers or Web application servers. It uses "junctions" to identify and address those servers. When a user wants to access those resources, the browser uses a set of URL links that have to be translated because the back-end Web server uses different links. In this paper we explain how Tivoli Access Manager WebSEAL processes URLs from the back-end server and the client. This IBM Redpaper™ document is intended to help implementors and system administrators who need to ... [more]


cover image

Single Sign-On Solutions for IBM FileNet P8 Using IBM Tivoli and WebSphere Security Technology
Analytics

Redbooks, published 3 Jun 2009, last updated 24 Nov 2009

Authentication is the act of verifying a user's identity based on the credentials that they have presented. Establishing each user's identity is a critical first step in any client/server based system. In this IBM® Redbooks® publication, we present an overview of the set of authentication options in the IBM FileNet® P8 V4.0 release. The two standards at the core of the authentication process in IBM FileNet P8 V4.0 are the Java™ Authentication and Authorization Service (JAAS) standard and the Web Services Security standard (WS-Security). The JAAS standard forms the framework for security ... [more]


cover image

Identity Management Design Guide with IBM Tivoli Identity Manager
Security

Redbooks, published 6 Nov 2009

Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user life cycle (including identity/resource provisioning for people (users)), and by integrating it into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions. This IBM® Redbooks® publication provides an approach for designing an identity ... [more]


cover image

Understanding IT Perimeter Security
Security

Redpaper, published 9 Jun 2008, last updated 2 Nov 2009

This IBM Redpaper publication takes a close look at the enterprise IT network perimeter, which has been diluted from a well-defined set of ingress and egress points to a mesh of undetectable flows from devices capable of accessing and penetrating corporate resources. The days of keeping the bad guys out by building a well-defined wall are definitely over. Businesses and organizations require collaboration with internal and external business partners, customers, and employees, which further removes walls and protective barriers. In this paper, we discuss how the variety of endpoints that were ... [more]


cover image

Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security
Security

Redpaper, published 30 Oct 2009, last updated 2 Nov 2009

Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the "best of both worlds", providing solid ... [more]


cover image

Using IBM Tivoli Key Lifecycle Manager: Business Benefits and Architecture Overview
Security

Redguide, published 26 Oct 2009, last updated 27 Oct 2009

Increasing global integration affects organizations in many positive ways, but it also presents challenges. The volume of data that moves within an organization and among organizations across the globe grows dramatically with increased global integration. At the same time, increasing threats to the data from within and outside the organization, increasing regulatory requirements from governments or oversight committees, and stringent contractual requirements from business partners all challenge the organization’s ability to effectively manage their data and ensure that it is available, ... [more]


cover image

Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z
z Systems

Redguide, published 16 Sep 2009

The financial impact of fraud is increasing for banks worldwide. Fraudulent attacks and data breaches are costly, not only in terms of reputation and loss of revenue, but also in the administrative costs of restoring the customer’s accounts and reporting exposures to regulatory agencies. Banks are also required to keep an increasing amount of capital reserve for fraud losses. All of these issues are placing a greater internal focus on enterprise risk management. Fraud is becoming a growing concern for financial institutions and an adequate enterprise-wide solution is required to deal with ... [more]


cover image

Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1
Security

Redbooks, published 10 Sep 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Federated Identity Manager V6.1" certification test, test number 000-891, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Federated Identity Manager Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work with the implementation of the IBM Tivoli Federated Identity Manager Version 6.1 product. This book provides a combination ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



Follow IBM Redbooks

Follow IBM Redbooks