Skip to main content

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

An IBM Redbooks publication

thumbnail 

Published on 22 August 2012

  1. .EPUB (5.7 MB)
  2. .PDF (19.8 MB)

Apple BooksGoogle Play Books

Share this page:   

ISBN-10: 0738436984
ISBN-13: 9780738436982
IBM Form #: SG24-7980-00


Authors: Axel Buecker, Alisson Campos, Peter Cutler, Andy Hu, Garreth Jeremiah, Toshiki Matsui and Michal Zarakowski

    menu icon

    Abstract

    Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging.

    The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges.

    In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution.

    This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.

    Table of Contents

    Part 1. Architecture and design

    Chapter 1. Business context for endpoint security and compliance management

    Chapter 2. Introducing the IBM Tivoli Endpoint Manager solution

    Chapter 3. IBM Tivoli Endpoint Manager component structure

    Chapter 4. IT endpoint security and compliance solution design

    Part 2. Customer environment

    Chapter 5. Overview of scenario, requirements, and approach

    Chapter 6. Phase I: Tivoli Endpoint Manager platform design and implementation

    Chapter 7. Phase II: Patch Management design and implementation

    Chapter 8. Phase III: Security policy configuration design and implementation

    Chapter 9. Phase IV: Security Compliance Analytics reporting

    Appendix A. Service offerings

    Appendix B. IBM deploys Tivoli Endpoint Manager internally

     

    Others who read this also read