Showing documents 41 to 60 of 149  Previous  Next

Results per page: 5 | 10 | 20


cover image

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
Security

Redbooks, published 22 Aug 2012

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage ... [more]


cover image

Integrating IBM Security and SAP Solutions
Security

Redbooks, published 23 Feb 2012, last updated 19 Mar 2012

Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM ... [more]


cover image

A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On
Security

Redpaper, published 16 Feb 2012

IBM® Security Access Manager for Enterprise Single Sign-On introduces a new level of security, authentication, and automation experience to business enterprise users on their desktop applications. On a day-to-day basis, the number of resources or applications that a business user accesses varies and is inevitably increasing. Applications that a user employs during normal daily activities might require a range of elements to authenticate or verify the user’s identity before granting access to corporate information. The classic authentication approach is the unique user name and password ... [more]


cover image

Set Up Security and Integration with the DataPower XI50z for zEnterprise
Application Integration

Redbooks, published 20 Dec 2011

This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that bridges the gap between mainframe and distributed. The DataPower XI50z (a multifunctional appliance) within the zEnterprise BladeCenter® Extension (zBX) is managed with a single point of control, which can help to streamline operations and maintenance. The DataPower XI50z simplifies the translation of your existing formats to XML (hardware acceleration) for easier communication and connectivity. This book will help you install, tailor, and configure the new attributes ... [more]


cover image

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
Security

Redbooks, published 2 Dec 2011, last updated 16 Dec 2011

Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats ... [more]


cover image

Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On
Security

Redpaper, published 15 Dec 2011

IBM® Tivoli® Access Manager for Enterprise Single Sign-On automates sign-on and access to enterprise applications, eliminating the need to remember and manage user names and passwords. Users log on to Tivoli Access Manager for Enterprise Single Sign-On with a special user ID and password, and then, when they access their secured applications, the Tivoli Access Manager for Enterprise Single Sign-On agent enters their stored credentials automatically without the users needing to do so. Tivoli Access Manager for Enterprise Single Sign-On provides the usual features associated with password ... [more]


cover image

Security on IBM z/VSE
z Systems

Redbooks, published 19 Nov 2011

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent—they could have been using resources without the business even being ... [more]


cover image

Setup and Configuration for IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 for Single-Server and Cluster Environments
Security

Redpaper, published 24 Nov 2010, last updated 7 Nov 2011

This IBM® Redpaper™ publication covers the detailed step-by-step installation of IBM Tivoli® Access Manager for Enterprise Single Sign-On 8.1 onto a single-server and a clustered environment. This paper supplements the IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Installation Guide and IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Setup Guide. Do not use this document in isolation. Check the relevant guides in the Tivoli Access Manager for Enterprise Single Sign-On Information Center as you perform the install. There might be various reasons to install Tivoli ... [more]


cover image

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
Security

Redbooks, published 26 Oct 2011

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security ... [more]


cover image

IBM Security Key Lifecycle Manager for z/OS: Deployment and Migration Considerations
Security

Redpaper, published 7 Oct 2011

This IBM® Redpaper™ publication discusses IBM Security Key Lifecycle Manager (ISKLM) for IBM z/OS® V1.1 and includes topics that discuss encryption capabilities, installation considerations, keystores, auditing, troubleshooting, and migration considerations. We also discuss common practices for key management and provide a sample REXX code procedure for exporting a data key. IBM Security Key Lifecycle Manager for z/OS manages encryption keys for storage, simplifying deployment and maintaining availability to data at rest natively on the System z mainframe environment. Security Key Lifecycle ... [more]


cover image

z/OS Identity Propagation
z Systems

Redbooks, published 29 Sep 2011

This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This ... [more]


cover image

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Security

Redbooks, published 18 Aug 2011

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough ... [more]


cover image

A Guide to Writing Advanced Access Profiles for IBM Tivoli Access Manager for Enterprise Single Sign-On
Security

Redpaper, published 15 Aug 2011

IBM® Tivoli® Access Manager for Enterprise Single Sign-On enables users to access all their applications, including web, desktop and heritage, and network resources, with the use of a single strong password. The solution helps simplify password management, protects information with strong authentication, and secures kiosks and shared workstations. Tivoli Access Manager for Enterprise Single Sign-On helps strengthen security and meet regulations through stronger passwords and an open authentication device interface with a wide choice of strong authentication factors. It also facilitates ... [more]


cover image

Architecting a Highly Efficient Image Management System with Tivoli Provisioning Manager for OS Deployment
Security

Redpaper, published 7 Mar 2007, last updated 11 Aug 2011

Tivoli Provisioning Manager for OS Deployment provisions operating systems and applications to computers using the Pre-boot eXecution Environment (PXE) industry standard for bare-metal installation. A bare-metal installation eliminates the need for an operating system to be present on a local disk drive. Tivoli Provisioning Manager for OS Deployment is a turn-key solution to the most common provisioning issues and provides an easy to use, turn-key solution for education, SMB, or larger accounts. In this IBM Redpaper, we discuss how to design and implement a highly effective image management ... [more]


cover image

IBM Tivoli Directory Server for z/OS
z Systems

Redbooks, published 30 Jun 2011, last updated 7 Jul 2011

This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes ... [more]


cover image

System z Crypto and TKE Update
z Systems

Redbooks, published 31 May 2011, last updated 20 Jun 2011

This IBM® Redbooks® publication provides detailed information about the implementation of hardware cryptography in the System z10® server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing the cryptographic support available on the IBM System z10, introducing the Crypto Express3 feature, briefly comparing the functions provided by the hardware and software, and providing a high-level overview of the application programming interfaces available for invoking cryptographic support. This book then provides detailed information about the Crypto ... [more]


cover image

IBM Data Center Networking: Planning for Virtualization and Cloud Computing
Cloud

Redbooks, published 9 May 2011

The enterprise data center has evolved dramatically in recent years. It has moved from a model that placed multiple data centers closer to users to a more centralized dynamic model. The factors influencing this evolution are varied but can mostly be attributed to regulatory, service level improvement, cost savings, and manageability. Multiple legal issues regarding the security of data housed in the data center have placed security requirements at the forefront of data center architecture. As the cost to operate data centers has increased, architectures have moved towards consolidation of ... [more]


cover image

Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System
Security

Redguide, published 17 Feb 2011

In this IBM® Redguide™ publication, we look closely at network-related security risks such as targeted attacks, worms, bots, intrusion attempts, phishing scams, and so on. These threats target vulnerabilities in IT systems, workstations, and applications and can have a crippling financial effect on all organizations, disrupting business processes, and causing loss of confidential and proprietary information. To better understand how these threats are targeting your organization, we examine the composition of today’s IT network perimeter, which has been diluted from a well-defined set of ... [more]


cover image

IBM Security Solutions Architecture for Network, Server and Endpoint
Security

Redbooks, published 17 Feb 2011

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those threats are there. Threats would not be harmful if there were no vulnerabilities that could be exploited. With IT environments becoming more complex every day, the challenges to keep an eye on all potential weaknesses are skyrocketing. Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and ... [more]


cover image

Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones
z Systems

Redguide, published 17 Feb 2011

Many customers wanting to do Linux® server consolidation and deployment to IBM® System z® experience challenges in balancing the security of a physical “air gap” with the low cost of consolidation on a single box: It goes against their instincts and training. Being able to understand the security implications, capabilities, advantages, and risks of virtual server consolidation helps to lower or remove barriers to growth and the decision to say “Yes” to System z. This IBM Redpaper™ publication describes the architecture of traditional network security zones (Internet, DMZ, application, ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks