Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

An IBM Redbooks publication

Published 22 August 2012

cover image

ISBN-10: 0738436984
ISBN-13: 9780738436982
IBM Form #: SG24-7980-00
(422 pages)

More options

Rate and comment

Authors: Axel Buecker, Alisson Campos, Peter Cutler, Andy Hu, Garreth Jeremiah, Toshiki Matsui, Michal Zarakowski

Abstract

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging.

The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges.

In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution.

This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.

Table of contents

Part 1. Architecture and design
Chapter 1. Business context for endpoint security and compliance management
Chapter 2. Introducing the IBM Tivoli Endpoint Manager solution
Chapter 3. IBM Tivoli Endpoint Manager component structure
Chapter 4. IT endpoint security and compliance solution design
Part 2. Customer environment
Chapter 5. Overview of scenario, requirements, and approach
Chapter 6. Phase I: Tivoli Endpoint Manager platform design and implementation
Chapter 7. Phase II: Patch Management design and implementation
Chapter 8. Phase III: Security policy configuration design and implementation
Chapter 9. Phase IV: Security Compliance Analytics reporting
Appendix A. Service offerings
Appendix B. IBM deploys Tivoli Endpoint Manager internally

Others who read this publication also read

Follow IBM Redbooks

Follow IBM Redbooks