Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
An IBM Redbooks publication
Published 22 August 2012
IBM Form #: SG24-7980-00
Authors: Axel Buecker, Alisson Campos, Peter Cutler, Andy Hu, Garreth Jeremiah, Toshiki Matsui, Michal Zarakowski
Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging.
The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges.
In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution.
This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.
Table of contents
Part 1. Architecture and design
Chapter 1. Business context for endpoint security and compliance management
Chapter 2. Introducing the IBM Tivoli Endpoint Manager solution
Chapter 3. IBM Tivoli Endpoint Manager component structure
Chapter 4. IT endpoint security and compliance solution design
Part 2. Customer environment
Chapter 5. Overview of scenario, requirements, and approach
Chapter 6. Phase I: Tivoli Endpoint Manager platform design and implementation
Chapter 7. Phase II: Patch Management design and implementation
Chapter 8. Phase III: Security policy configuration design and implementation
Chapter 9. Phase IV: Security Compliance Analytics reporting
Appendix A. Service offerings
Appendix B. IBM deploys Tivoli Endpoint Manager internally
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks