Skip to main content

IBM Security Solutions Architecture for Network, Server and Endpoint

An IBM Redbooks publication

thumbnail 

Published on 17 February 2011

  1. .EPUB (6.8 MB)
  2. .PDF (31.3 MB)

Apple BooksGoogle Play Books

Share this page:   

ISBN-10: 0738435430
ISBN-13: 9780738435435
IBM Form #: SG24-7581-01


Authors: Axel Buecker, Kent Browne, Louis Foss, Jaco Jacobs, Vladimir Jeremic, Carsten Lorenz, Craig Stabler and Joris Van Herzele

    menu icon

    Abstract

    Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those threats are there. Threats would not be harmful if there were no vulnerabilities that could be exploited. With IT environments becoming more complex every day, the challenges to keep an eye on all potential weaknesses are skyrocketing.

    Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and remediation, become necessary to counter a growing number of attacks against networks, servers, and endpoints in every organization.

    In this IBM® Redbooks® publication, we examine the aspects of the holistic Threat and Vulnerability Management component in the Network, Server and Endpoint domain of the IBM Security Framework. We explain the comprehensive solution approach, identify business drivers and issues, and derive corresponding functional and technical requirements, which enables us to choose and create matching security solutions.

    We discuss IBM Security Solutions for Network, Server and Endpoint to effectively counter threats and attacks using a range of protection technologies and service offerings. Using two customer scenarios, we apply the solution design approach and show how to address the customer requirements by identifying the corresponding IBM service and software products.

    Table of Contents

    Part 1. Business context and terminology

    Chapter 1. Introducing the IBM Security Framework and IBM Security Blueprint

    Chapter 2. The components of the IBM Security Blueprint

    Chapter 3. The Network, Server and Endpoint solution pattern

    Chapter 4. Common security architecture and network models

    Chapter 5. Threat and vulnerability management

    Part 2. IBM Security Solutions for Network, Server and Endpoint

    Chapter 6. Security intelligence, research, and technology

    Chapter 7. Centralized management

    Chapter 8. Network security solutions

    Chapter 9. Host security solutions

    Chapter 10. Virtual server security solutions

    Chapter 11. Security services for Network, Server and Endpoint

    Part 3. Business scenarios

    Chapter 12. A-B-C Government Agency

    Chapter 13. X-Y-Z Cardio

     

    Others who read this also read