Showing documents 41 to 60 of 120  Previous  Next

Results per page: 5 | 10 | 20


cover image

Enhancing Password Management by Adding Security, Flexibility, and Agility
Security

Solution Guide, published 7 Dec 2012

The number of logins and passwords that employees must manage on a daily basis continues to be a source of frustration and lost productivity. Employees must remember login information for numerous applications. Many of these applications require different user names and passwords, different password complexity requirements, and forced password changes in shorter intervals. The number of logins that an employee must manage grows with the deployment of each additional business application. The corporate help desk often endures the process of restoring lost or forgotten login information for an ... [more]


cover image

A Sweeping Approach to Security
IBM Z

Point-of-View, published 29 Nov 2012, last updated 29 Nov 2012

Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be protected. Consequently, organizations increasingly need to implement a smarter approach that relies on fine-grained control of access privileges and far field detection of potential and seemingly unrelated threats. Such an approach must also rely on multitier containment methods to isolate intrusions and to minimize damage. To adopt a broad security approach ... [more]


cover image

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
Security

Redbooks, published 11 Sep 2012

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for ... [more]


cover image

RACF Remote Sharing Facility over TCP/IP
IBM Z

Redbooks, published 30 Aug 2012

The IBM RACF® remote sharing facility (RRSF) allows RACF to communicate with other IBM z/OS® systems that use RACF, allowing you to maintain remote RACF databases. RRSF support for the security administrator provides these benefits:

  • Administration of RACF databases from anywhere in the RRSF network
  • Creation of User ID associations for password and password phrase synchronization
  • Automatic synchronization of databases
    Before to z/OS V1R13, RRSF only supported the APPC protocol. With z/OS release V1R13, TCP/IP can be used to extend the RACF Remote Sharing Facility ... [more]


  • cover image

    Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
    Security

    Redbooks, published 22 Aug 2012

    Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage ... [more]


    cover image

    Integrating IBM Security and SAP Solutions
    Security

    Redbooks, published 23 Feb 2012, last updated 19 Mar 2012

    Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM ... [more]


    cover image

    A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On
    Security

    Redpaper, published 16 Feb 2012

    IBM® Security Access Manager for Enterprise Single Sign-On introduces a new level of security, authentication, and automation experience to business enterprise users on their desktop applications. On a day-to-day basis, the number of resources or applications that a business user accesses varies and is inevitably increasing. Applications that a user employs during normal daily activities might require a range of elements to authenticate or verify the user’s identity before granting access to corporate information. The classic authentication approach is the unique user name and password ... [more]


    cover image

    Set Up Security and Integration with the DataPower XI50z for zEnterprise
    Application Integration

    Redbooks, published 20 Dec 2011

    This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that bridges the gap between mainframe and distributed. The DataPower XI50z (a multifunctional appliance) within the zEnterprise BladeCenter® Extension (zBX) is managed with a single point of control, which can help to streamline operations and maintenance. The DataPower XI50z simplifies the translation of your existing formats to XML (hardware acceleration) for easier communication and connectivity. This book will help you install, tailor, and configure the new attributes ... [more]


    cover image

    Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
    Security

    Redbooks, published 2 Dec 2011, last updated 16 Dec 2011

    Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization. The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats ... [more]


    cover image

    Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On
    Security

    Redpaper, published 15 Dec 2011

    IBM® Tivoli® Access Manager for Enterprise Single Sign-On automates sign-on and access to enterprise applications, eliminating the need to remember and manage user names and passwords. Users log on to Tivoli Access Manager for Enterprise Single Sign-On with a special user ID and password, and then, when they access their secured applications, the Tivoli Access Manager for Enterprise Single Sign-On agent enters their stored credentials automatically without the users needing to do so. Tivoli Access Manager for Enterprise Single Sign-On provides the usual features associated with password ... [more]


    cover image

    Setup and Configuration for IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 for Single-Server and Cluster Environments
    Security

    Redpaper, published 24 Nov 2010, last updated 7 Nov 2011

    This IBM® Redpaper™ publication covers the detailed step-by-step installation of IBM Tivoli® Access Manager for Enterprise Single Sign-On 8.1 onto a single-server and a clustered environment. This paper supplements the IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Installation Guide and IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 Setup Guide. Do not use this document in isolation. Check the relevant guides in the Tivoli Access Manager for Enterprise Single Sign-On Information Center as you perform the install. There might be various reasons to install Tivoli ... [more]


    cover image

    IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
    Security

    Redbooks, published 26 Oct 2011

    In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security ... [more]


    cover image

    IBM Security Key Lifecycle Manager for z/OS: Deployment and Migration Considerations
    Security

    Redpaper, published 7 Oct 2011

    This IBM® Redpaper™ publication discusses IBM Security Key Lifecycle Manager (ISKLM) for IBM z/OS® V1.1 and includes topics that discuss encryption capabilities, installation considerations, keystores, auditing, troubleshooting, and migration considerations. We also discuss common practices for key management and provide a sample REXX code procedure for exporting a data key. IBM Security Key Lifecycle Manager for z/OS manages encryption keys for storage, simplifying deployment and maintaining availability to data at rest natively on the System z mainframe environment. Security Key Lifecycle ... [more]


    cover image

    z/OS Identity Propagation
    IBM Z

    Redbooks, published 29 Sep 2011

    This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail from RACF show both RACF and distributed identities. This book describes the concept of identity propagation and how it can address the end-to end accountability issue of many customers. It describes, at a high level, what identity propagation is, and why it is important to us. It shows a conceptual view of the key elements necessary to accomplish this. This ... [more]


    cover image

    IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
    Security

    Redbooks, published 18 Aug 2011

    Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough ... [more]


    cover image

    A Guide to Writing Advanced Access Profiles for IBM Tivoli Access Manager for Enterprise Single Sign-On
    Security

    Redpaper, published 15 Aug 2011

    IBM® Tivoli® Access Manager for Enterprise Single Sign-On enables users to access all their applications, including web, desktop and heritage, and network resources, with the use of a single strong password. The solution helps simplify password management, protects information with strong authentication, and secures kiosks and shared workstations. Tivoli Access Manager for Enterprise Single Sign-On helps strengthen security and meet regulations through stronger passwords and an open authentication device interface with a wide choice of strong authentication factors. It also facilitates ... [more]


    cover image

    IBM Tivoli Directory Server for z/OS
    IBM Z

    Redbooks, published 30 Jun 2011, last updated 7 Jul 2011

    This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes ... [more]


    cover image

    System z Crypto and TKE Update
    IBM Z

    Redbooks, published 31 May 2011, last updated 20 Jun 2011

    This IBM® Redbooks® publication provides detailed information about the implementation of hardware cryptography in the System z10® server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing the cryptographic support available on the IBM System z10, introducing the Crypto Express3 feature, briefly comparing the functions provided by the hardware and software, and providing a high-level overview of the application programming interfaces available for invoking cryptographic support. This book then provides detailed information about the Crypto ... [more]


    cover image

    IBM Data Center Networking: Planning for Virtualization and Cloud Computing
    Cloud

    Redbooks, published 9 May 2011

    The enterprise data center has evolved dramatically in recent years. It has moved from a model that placed multiple data centers closer to users to a more centralized dynamic model. The factors influencing this evolution are varied but can mostly be attributed to regulatory, service level improvement, cost savings, and manageability. Multiple legal issues regarding the security of data housed in the data center have placed security requirements at the forefront of data center architecture. As the cost to operate data centers has increased, architectures have moved towards consolidation of ... [more]


    cover image

    Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System
    Security

    Redguide, published 17 Feb 2011

    In this IBM® Redguide™ publication, we look closely at network-related security risks such as targeted attacks, worms, bots, intrusion attempts, phishing scams, and so on. These threats target vulnerabilities in IT systems, workstations, and applications and can have a crippling financial effect on all organizations, disrupting business processes, and causing loss of confidential and proprietary information. To better understand how these threats are targeting your organization, we examine the composition of today’s IT network perimeter, which has been diluted from a well-defined set of ... [more]


     Previous  Next

    The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



    Follow IBM Redbooks

    Follow IBM Redbooks