Showing documents 61 to 90 of 120  Previous  Next

Results per page: 5 | 10 | 20


cover image

Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System
Security

Redguide, published 17 Feb 2011

In this IBM® Redguide™ publication, we look closely at network-related security risks such as targeted attacks, worms, bots, intrusion attempts, phishing scams, and so on. These threats target vulnerabilities in IT systems, workstations, and applications and can have a crippling financial effect on all organizations, disrupting business processes, and causing loss of confidential and proprietary information. To better understand how these threats are targeting your organization, we examine the composition of today’s IT network perimeter, which has been diluted from a well-defined set of ... [more]


cover image

IBM Security Solutions Architecture for Network, Server and Endpoint
Security

Redbooks, published 17 Feb 2011

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those threats are there. Threats would not be harmful if there were no vulnerabilities that could be exploited. With IT environments becoming more complex every day, the challenges to keep an eye on all potential weaknesses are skyrocketing. Smart methods to detect threats and vulnerabilities, as well as highly efficient approaches to analysis, mitigation, and ... [more]


cover image

Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones
IBM Z

Redguide, published 17 Feb 2011

Many customers wanting to do Linux® server consolidation and deployment to IBM® System z® experience challenges in balancing the security of a physical “air gap” with the low cost of consolidation on a single box: It goes against their instincts and training. Being able to understand the security implications, capabilities, advantages, and risks of virtual server consolidation helps to lower or remove barriers to growth and the decision to say “Yes” to System z. This IBM Redpaper™ publication describes the architecture of traditional network security zones (Internet, DMZ, application, ... [more]


cover image

Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance
Security

Redpaper, published 23 Sep 2010

Today, security is a concern for everyone, from members of the board to the data center. Each day another data breach occurs. These incidents can affect an organization's brand, investment return, and customer base. Time spent managing security incidents and managing risks can take time away from focusing on strategic business objectives. Organizations need to address security challenges by administering, securing, and monitoring identities, roles, and entitlements with efficient life-cycle management, access controls, and compliance auditing. Those tasks include automated and policy-based ... [more]


cover image

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS
IBM Z Software

Redpaper, published 12 Aug 2010

Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent mistakes of privileged users alone can result in millions of dollars in damages through unintentional configuration errors and careless security commands. Malicious users with authorized access can cause even greater damage. As a result, security management faces a serious challenge to adequately protect a company's sensitive data. Likewise, IT staff is ... [more]


cover image

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Security

Redbooks, published 16 Jul 2010

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and ... [more]


cover image

Robust Integration with Tivoli Directory Integrator 7.0
Security

Redpaper, published 1 Jun 2010

What is perfectly acceptable to one person is a potential disaster for another. The concept of availability is closely related to risk tolerance. This document illustrates the options and capabilities that an integration designer can use when planning, developing, and deploying an integration solution using IBM Tivoli® Directory Integrator. The challenges discussed in this IBM® Redpaper™ publication are not unique to Tivoli Directory Integrator, nor are the approaches to mitigate them. However, Tivoli Directory Integrator is an unusually flexible product, and understanding its capabilities ... [more]


cover image

IBM z/OS V1R10 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking
IBM Z

Redbooks, published 6 Jul 2009, last updated 26 Apr 2010

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors, providing, among many other capabilities, world-class, state-of-the-art, support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of ... [more]


cover image

Identity Management for IBM Cognos 8 with IBM Tivoli Identity Manager
Analytics

Redpaper, published 9 Feb 2010

This IBM® Redpaper™ publication describes how IBM Tivoli® Identity Manager can be used as a comprehensive identity management solution for IBM Cognos® 8. IBM Cognos 8 provides a security architecture that is flexible and compatible with existing security models. It can be integrated with authentication and cryptographic providers. Authentication in IBM Cognos 8 can be integrated with third-party authentication providers, such IBM Tivoli Directory Server, Sun ONE Directory Server, Microsoft® Active Directory server, and so on. IBM Cognos 8 does not create or manage users as it is expected to ... [more]


cover image

Certification Study Guide Series: IBM Tivoli Access Manager for Enterprise Single Sign-On 8.0
Security

Redbooks, published 13 Aug 2009, last updated 8 Jan 2010

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Access Manager for Enterprise Single Sign-On V8.0" certification test, test number 000-020, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Access Manager for Enterprise Single Sign-On Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work with the implementation of the IBM Tivoli Access Manager for Enterprise Single Sign-On ... [more]


cover image

IBM Lotus Domino Integration Using IBM Tivoli Directory Integrator
Security

Redpaper, published 31 Dec 2009

In this IBM® Redpaper™ publication we take you step-by-step through a series of integration scenarios to help you start building your own solutions with IBM Tivoli® Directory Integrator. Once you have mastered basic skills you will quickly be wiring your IBM Lotus® Domino® applications (both the shrink-wrapped and home-grown varieties) more tightly into the infrastructure, and you will also be sharing data between Lotus Domino and other systems more simply and easily than you probably thought was ... [more]


cover image

IBM Tivoli Provisioning Manager V7.1.1: Deployment and IBM Service Management Integration Guide
Security

Redbooks, published 7 Dec 2009

NOTE: THIS PUBLICATION IS AVAILABLE IN SOFTCOPY ONLY. This IBM® Redbooks® publication is a complete reference for the recently available Tivoli® Provisioning Manager V7.1.1 product. This document provides information valuable to those who want to plan for, customize, and use the IBM Tivoli Provisioning Manager V7.1.1 product to automate and manage IT provisioning and integrated IT service management processes in their environments. It includes five parts: Concepts and architecture: Provides an overview of provisioning concepts and introduces Tivoli Provisioning Manager V7.1.1 concepts and ... [more]


cover image

IBM Tivoli Access Manager for e-business: Junctions and Links
Security

Redpaper, published 3 Dec 2009

IBM® Tivoli® Access Manager for e-business can manage and enforce access control to Web-based resources located on Web servers or Web application servers. It uses "junctions" to identify and address those servers. When a user wants to access those resources, the browser uses a set of URL links that have to be translated because the back-end Web server uses different links. In this paper we explain how Tivoli Access Manager WebSEAL processes URLs from the back-end server and the client. This IBM Redpaper™ document is intended to help implementors and system administrators who need to ... [more]


cover image

Single Sign-On Solutions for IBM FileNet P8 Using IBM Tivoli and WebSphere Security Technology
Analytics

Redbooks, published 3 Jun 2009, last updated 24 Nov 2009

Authentication is the act of verifying a user's identity based on the credentials that they have presented. Establishing each user's identity is a critical first step in any client/server based system. In this IBM® Redbooks® publication, we present an overview of the set of authentication options in the IBM FileNet® P8 V4.0 release. The two standards at the core of the authentication process in IBM FileNet P8 V4.0 are the Java™ Authentication and Authorization Service (JAAS) standard and the Web Services Security standard (WS-Security). The JAAS standard forms the framework for security ... [more]


cover image

Identity Management Design Guide with IBM Tivoli Identity Manager
Security

Redbooks, published 6 Nov 2009

Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user life cycle (including identity/resource provisioning for people (users)), and by integrating it into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions. This IBM® Redbooks® publication provides an approach for designing an identity ... [more]


cover image

Understanding IT Perimeter Security
Security

Redpaper, published 9 Jun 2008, last updated 2 Nov 2009

This IBM Redpaper publication takes a close look at the enterprise IT network perimeter, which has been diluted from a well-defined set of ingress and egress points to a mesh of undetectable flows from devices capable of accessing and penetrating corporate resources. The days of keeping the bad guys out by building a well-defined wall are definitely over. Businesses and organizations require collaboration with internal and external business partners, customers, and employees, which further removes walls and protective barriers. In this paper, we discuss how the variety of endpoints that were ... [more]


cover image

Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security
Security

Redpaper, published 30 Oct 2009, last updated 2 Nov 2009

Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the "best of both worlds", providing solid ... [more]


cover image

Using IBM Tivoli Key Lifecycle Manager: Business Benefits and Architecture Overview
Security

Redguide, published 26 Oct 2009, last updated 27 Oct 2009

Increasing global integration affects organizations in many positive ways, but it also presents challenges. The volume of data that moves within an organization and among organizations across the globe grows dramatically with increased global integration. At the same time, increasing threats to the data from within and outside the organization, increasing regulatory requirements from governments or oversight committees, and stringent contractual requirements from business partners all challenge the organization’s ability to effectively manage their data and ensure that it is available, ... [more]


cover image

Enterprise Fraud Management with ACI Proactive Risk Manager on IBM System z
IBM Z

Redguide, published 16 Sep 2009

The financial impact of fraud is increasing for banks worldwide. Fraudulent attacks and data breaches are costly, not only in terms of reputation and loss of revenue, but also in the administrative costs of restoring the customer’s accounts and reporting exposures to regulatory agencies. Banks are also required to keep an increasing amount of capital reserve for fraud losses. All of these issues are placing a greater internal focus on enterprise risk management. Fraud is becoming a growing concern for financial institutions and an adequate enterprise-wide solution is required to deal with ... [more]


cover image

Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1
Security

Redbooks, published 10 Sep 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Federated Identity Manager V6.1" certification test, test number 000-891, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Federated Identity Manager Certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work with the implementation of the IBM Tivoli Federated Identity Manager Version 6.1 product. This book provides a combination ... [more]


cover image

IBM Tivoli Key Lifecycle Manager for z/OS
Security

Redpaper, published 6 Aug 2009

This IBM® Redbooks® publication provides details of a new offering called IBM Tivoli® Key Lifecycle Manager. We introduce the product, provide planning suggestions, and detail the installation of IBM Tivoli Key Lifecycle Manager on the z/OS® operating system running on a System z® server. Tivoli Key Lifecycle Manager is IBM’s latest storage device encryption solution. It allows enterprises to create, manage, backup, and distribute their cryptographic key material from a single control point. Tivoli Key Lifecycle Manager has evolved from the existing IBM Encryption Key Manager solution. ... [more]


cover image

Certification Study Guide: IBM Tivoli Identity Manager Version 5.0
Security

Redbooks, published 19 Feb 2009, last updated 23 Feb 2009

This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Identity Manager V5.0" certification test, test number 934, and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Certified Deployment Professional - IBM Tivoli Identity Manager V5.0 certification, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation of the IBM Tivoli Identity Manager Version 5.0 product. This book provides a ... [more]


cover image

IBM Tivoli Security Policy Manager
Security

Redpaper, published 17 Feb 2009

In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to be implemented, managed, and enforced by the service-oriented infrastructure (SOA) consistently. Expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation, including SOA solutions. First, a flexible policy management framework must be in place to achieve alignment with ... [more]


cover image

Deployment Guide Series: IBM Tivoli Identity Manager 5.0
Security

Redbooks, published 10 Dec 2008

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the ... [more]


cover image

Designing for Solution-Based Security on z/OS
IBM Z

Redbooks, published 16 Oct 2008

This IBM Redbooks publication provides solution designers and architects with a comprehensive view of the security services they can exploit on z/OS, whether their application is hosted by z/OS or by another platform. It also discusses, at a high level, the Tivoli products that team with mainframe security services to provide flexible and extensible security architectures that fit On Demand infrastructure requirements, because implementing optimum solution-based security requires extensive knowledge of what security services and APIs provide on the platforms for which you are developing the ... [more]


cover image

Deployment Guide Series: IBM Tivoli Access Manager for e-business V6.0
Security

Redbooks, published 1 Jul 2008

Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an access control implementation. This IBM Redbooks publication takes a step-by-step approach to implementing an access control solution based on IBM Tivoli Access Manager for e-business. Part 1 takes you through an example company profile with existing business policies and guidelines ... [more]


cover image

Integrated Identity and Access Management Architectural Patterns
Security

Redpaper, published 29 May 2008

Customers implement an integrated Identity and Access Management (IAM) solution to address many business requirements. The overall driving requirement is to provide a combination of business processes and technologies to manage and secure access to the information and resources within the organization. Towards addressing this overall goal, the IAM solution first needs to provide a method of granting users access to applications and systems across the enterprise that they need to perform their jobs. Second, it needs the capability to authorize proper access levels to resources based on ... [more]


cover image

Understanding SOA Security Design and Implementation
Security

Redbooks, published 8 Nov 2007, last updated 29 May 2008

Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and applications, and their possible operations across trust boundaries. To enable a business so that its processes and applications are flexible, you must start by expecting changes – both to process and application logic, as well as to the policies associated with them. Merely securing the perimeter is not sufficient for a flexible on demand business. In this IBM ... [more]


cover image

Identity Management Advanced Design for IBM Tivoli Identity Manager
Security

Redbooks, published 28 Aug 2006, last updated 22 May 2008

Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, this IBM Redbooks publication creates or enhances confidence in the IBM Tivoli Identity Manager-based solution for senior management, architects, and security administrators. Advanced design topics can start with infrastructure availability for all involved components, Web application, and database server clustering as well as LDAP multi-master setups, ... [more]


cover image

Federated Identity and Trust Management
Security

Redpaper, published 15 May 2008

This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to Web middleware (Java 2 Platform Enterprise Edition (J2EE) and Microsoft .NET), Tivoli security solutions allow you to increase the reach of your business. They build on existing Web security investments that can quickly evolve to take advantage of web services and federation ... [more]


 Previous  Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



Follow IBM Redbooks

Follow IBM Redbooks