Showing documents 81 to 100 of 149  Previous  Next

Results per page: 5 | 10 | 20


cover image

Using IBM Tivoli Key Lifecycle Manager: Business Benefits and Architecture Overview
Security

Redguide, published 26 Oct 2009, last updated 27 Oct 2009

Increasing global integration affects organizations in many positive ways, but it also presents challenges. The volume of data that moves within an organization and among organizations across the globe grows dramatically with increased global integration. At the same time, increasing threats to the data from within and outside the organization, increasing regulatory requirements from governments or oversight committees, and stringent contractual requirements from business partners all challenge the organization’s ability to effectively manage their data and ensure that it is available, ... [more]


cover image

Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z
z Systems

Redguide, published 16 Sep 2009

The financial impact of fraud is increasing for banks worldwide. Fraudulent attacks and data breaches are costly, not only in terms of reputation and loss of revenue, but also in the administrative costs of restoring the customer’s accounts and reporting exposures to regulatory agencies. Banks are also required to keep an increasing amount of capital reserve for fraud losses. All of these issues are placing a greater internal focus on enterprise risk management. Fraud is becoming a growing concern for financial institutions and an adequate enterprise-wide solution is required to deal with ... [more]


cover image

Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1
Security

Redbooks, published 10 Sep 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Federated Identity Manager V6.1" certification test, test number 000-891, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Federated Identity Manager Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work with the implementation of the IBM Tivoli Federated Identity Manager Version 6.1 product. This book provides a combination ... [more]


cover image

IBM Tivoli Key Lifecycle Manager for z/OS
Security

Redpaper, published 6 Aug 2009

This IBM® Redbooks® publication provides details of a new offering called IBM Tivoli® Key Lifecycle Manager. We introduce the product, provide planning suggestions, and detail the installation of IBM Tivoli Key Lifecycle Manager on the z/OS® operating system running on a System z® server. Tivoli Key Lifecycle Manager is IBM’s latest storage device encryption solution. It allows enterprises to create, manage, backup, and distribute their cryptographic key material from a single control point. Tivoli Key Lifecycle Manager has evolved from the existing IBM Encryption Key Manager solution. ... [more]


cover image

Implementing an Image Management System with Tivoli Provisioning Manager for OS Deployment: Case Studies and Business Benefits
Security

Redguide, published 17 Mar 2009

IBM® Tivoli® Provisioning Manager for OS Deployment provides an easy-to-use console for remote OS deployment and management. Tivoli Provisioning Manager for OS Deployment offers flexible alternatives for creating and managing operating system cloned or scripted image installs. IBM Tivoli Provisioning Manager for OS Deployment provides significant IT cost savings and business operating efficiencies that ensure the strategic advantage of your business. This IBM Redguide™ publication discusses the business benefits of using Tivoli Provisioning Manager for OS Deployment and demonstrates, by ... [more]


cover image

Flexible Policy Management for IT Security Services Using IBM Tivoli Security Policy Manager
Security

Redguide, published 17 Mar 2009

In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to be implemented, managed, and enforced by the service-oriented infrastructure (SOA) consistently. Expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation, including SOA solutions. First, a flexible policy management framework must be in place to achieve alignment with ... [more]


cover image

Certification Study Guide: IBM Tivoli Identity Manager Version 5.0
Security

Redbooks, published 19 Feb 2009, last updated 23 Feb 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Identity Manager V5.0" certification test, test number 934, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Certified Deployment Professional - IBM Tivoli Identity Manager V5.0 certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation of the IBM Tivoli Identity Manager Version 5.0 product. This book provides a ... [more]


cover image

IBM Tivoli Security Policy Manager
Security

Redpaper, published 17 Feb 2009

In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to be implemented, managed, and enforced by the service-oriented infrastructure (SOA) consistently. Expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation, including SOA solutions. First, a flexible policy management framework must be in place to achieve alignment with ... [more]


cover image

Creating IDML Discovery Books with IBM Tivoli Directory Integrator
Security

Redpaper, published 19 Jan 2009

IBM® Tivoli® Application Dependency Discovery Manager (TADDM) is a powerful tool for discovering and classifying information about hardware and software assets, along with their relationships and dependencies. In spite of automatic discovery features, you may find yourself having to extract additional data from files, databases, and other sources, reformatting it and writing it out as Identity Markup Language (IDML) files that Tivoli Application Dependency Discovery Manager can import. IDML is the Extensible Markup Language (XML) dialect used to describe Configuration Items (CIs) and their ... [more]


cover image

Deployment Guide Series: IBM Tivoli Identity Manager 5.0
Security

Redbooks, published 10 Dec 2008

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the ... [more]


cover image

Designing for Solution-Based Security on z/OS
z Systems

Redbooks, published 16 Oct 2008

This IBM Redbooks publication provides solution designers and architects with a comprehensive view of the security services they can exploit on z/OS, whether their application is hosted by z/OS or by another platform. It also discusses, at a high level, the Tivoli products that team with mainframe security services to provide flexible and extensible security architectures that fit On Demand infrastructure requirements, because implementing optimum solution-based security requires extensive knowledge of what security services and APIs provide on the platforms for which you are developing the ... [more]


cover image

IBM Tivoli Security Solutions for Microsoft Software Environments
Security

Redpaper, published 30 Sep 2008

You can use IBM® Tivoli® Security products to build open, flexible, and scalable solutions to address business requirements in the areas of: -- Identity and access management -- Security information and event management One of the many strengths of the IBM Tivoli Security offerings is that they are designed and implemented as cross-platform solutions. This design enables broad adoption of the solutions across the range of disparate platforms typically found in an enterprise. IBM Tivoli Security solutions are, therefore, an excellent choice as organizations move further towards ... [more]


cover image

Deployment Guide Series: IBM Tivoli Access Manager for e-business V6.0
Security

Redbooks, published 1 Jul 2008

Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an access control implementation. This IBM Redbooks publication takes a step-by-step approach to implementing an access control solution based on IBM Tivoli Access Manager for e-business. Part 1 takes you through an example company profile with existing business policies and guidelines ... [more]


cover image

Integrated Identity and Access Management Architectural Patterns
Security

Redpaper, published 29 May 2008

Customers implement an integrated Identity and Access Management (IAM) solution to address many business requirements. The overall driving requirement is to provide a combination of business processes and technologies to manage and secure access to the information and resources within the organization. Towards addressing this overall goal, the IAM solution first needs to provide a method of granting users access to applications and systems across the enterprise that they need to perform their jobs. Second, it needs the capability to authorize proper access levels to resources based on ... [more]


cover image

Understanding SOA Security Design and Implementation
Security

Redbooks, published 8 Nov 2007, last updated 29 May 2008

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business. In this IBM ... [more]


cover image

Identity Management Advanced Design for IBM Tivoli Identity Manager
Security

Redbooks, published 28 Aug 2006, last updated 22 May 2008

Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, ... [more]


cover image

Federated Identity and Trust Management
Security

Redpaper, published 15 May 2008

This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to Web middleware (Java 2 Platform Enterprise Edition (J2EE) and Microsoft .NET), Tivoli security solutions allow you to increase the reach of your business. They build on existing Web security investments that can quickly evolve to take advantage of web services and federation ... [more]


cover image

IBM WebSphere DataPower SOA Appliances Part II: Authentication and Authorization
Application Integration

Redpaper, published 1 Apr 2008

IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, secure, and accelerate your XML and Web services deployments while extending your SOA infrastructure. These appliances offer an innovative, pragmatic approach to harness the power of SOA. By using them, you can simultaneously use the value of your existing application, security, and networking infrastructure investments. This series of IBM Redbooks publications is ... [more]


cover image

IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide
Application Integration

Redpaper, published 1 Apr 2008

IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, help secure, and accelerate your XML and Web services deployments while extending your SOA infrastructure. These appliances offer an innovative, pragmatic approach to harness the power of SOA. By using them, you can simultaneously use the value of your existing application, security, and networking infrastructure investments. This series of IBM Redbooks publications ... [more]


cover image

Auditing UNIX/Linux System Use with Tivoli Access Manager for Operating Systems and Tivoli Compliance Insight Manager
Security

Redpaper, published 29 Feb 2008, last updated 3 Mar 2008

This IBM® Redpaper looks at auditing UNIX/Linux® system use with the Tivoli® Access™ Manager for Operating Systems and Tivoli Compliance Insight Manager products, and focuses only on UNIX/Linux system auditing. Any site that has deployed a large number of UNIX® or Linux systems will be familiar with the security concerns that are entrenched in these operating systems. One of the most significant is the concern over the use of the superuser account, root, or any account with UID=0. The root user has access to any resource in the system, and where this activity is logged through system ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks