Identity Management Design Guide with IBM Tivoli Identity Manager

Identity Management Design Guide with IBM Tivoli Identity Manager

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2009-11-06

Total Pages: 704

ISBN-13: 0738433799

DOWNLOAD EBOOK

Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user life cycle (including identity/resource provisioning for people (users)), and by integrating it into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions. This IBM® Redbooks® publication provides an approach for designing an identity management solution with IBM Tivoli® Identity Manager Version 5.1. Starting from the high-level, organizational viewpoint, we show how to define user registration and maintenance processes using the self-registration and self-care interfaces as well as the delegated administration capabilities. Using the integrated workflow, we automate the submission/approval processes for identity management requests, and with the automated user provisioning, we take workflow output and automatically implement the administrative requests on the environment with no administrative intervention. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized identity management and security infrastructure.


Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2014-02-06

Total Pages: 240

ISBN-13: 0738437891

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.


Tivoli Integration Scenarios

Tivoli Integration Scenarios

Author: Redbooks Tivoli Integration Scenarios Team IBM

Publisher: IBM Redbooks

Published: 2011-01-11

Total Pages: 876

ISBN-13: 0738435139

DOWNLOAD EBOOK

This IBM® Redbooks® publication provides a broad view of how Tivoli® system management products work together in several common scenarios. You must achieve seamless integration for operations personnel to work with the solution. This integration is necessary to ensure that the product can be used easily by the users. Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations. The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products. We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work. This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.


IBM Security Access Manager Appliance Deployment Patterns

IBM Security Access Manager Appliance Deployment Patterns

Author: Shahnawaz Backer

Publisher: IBM Redbooks

Published: 2015-11-02

Total Pages: 98

ISBN-13: 0738454559

DOWNLOAD EBOOK

IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on several popular hypervisors. The integrated appliance form factor enables easier and more flexible deployment and maintenance. This IBM RedpaperTM publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes various deployment considerations, such as networking, high-availability, performance, disaster recovery, and scalability. All of these deployment patterns are covered within the context of realistic business scenarios. This paper is especially helpful to Security Access Manager architects and deployment specialists.


Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2012-09-11

Total Pages: 494

ISBN-13: 0738437034

DOWNLOAD EBOOK

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for Enterprise Single Sign-On 8.2, which provides single sign-on to many applications, without a lengthy and complex implementation effort. Whether you are deploying strong authentication, implementing an enterprise-wide identity management initiative, or simply focusing on the sign-on challenges of a specific group of users, this solution can deliver the efficiencies and security that come with a well-crafted and comprehensive single sign-on solution. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement an identity management solution in a medium-scale environment. This book is an update to the existing SG24-7350-01. IMPORTANT: Please note that in the latest version of SAM ESSO, the following two capabilities described in this SAM ESSO Redbooks publication have been removed: -Virtual appliance support -Mobile (iPad) support


Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2012-08-22

Total Pages: 422

ISBN-13: 0738436984

DOWNLOAD EBOOK

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges. In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution. This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.


IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2010-07-16

Total Pages: 464

ISBN-13: 0738434469

DOWNLOAD EBOOK

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.


IBM Intelligent Operations Center for Smarter Cities Administration Guide

IBM Intelligent Operations Center for Smarter Cities Administration Guide

Author: Bhowmick Arundhati

Publisher: IBM Redbooks

Published: 2012-11-30

Total Pages: 250

ISBN-13: 0738437492

DOWNLOAD EBOOK

IBM® defines a smarter city as one that makes optimal use of all available information to better understand and control its operations and optimize the use of resources. There is much information available from different sources. However, city officials often lack the holistic view of the city's operations that is required to respond to the citizens' needs in a timely manner and use the city resources wisely. IBM Intelligent Operations Center delivers a unified view of city agencies, providing three primary elements for successful management of cities: use information, anticipate problems, and coordinate actions and resources. Chapter 1 of this IBM Redbooks® publication introduces the IBM Intelligent Operations Center solution. The chapter provides a high-level overview of its features, benefits, and architecture. This information is intended for city officials and IT architects that must understand the business value of IBM Intelligent Operations Center and its architecture. The remaining chapters of this book focus on information that help IBM Intelligent Operations Center administrators perform daily administration tasks. This book describes commands and tools that IBM Intelligent Operations Center administrators must use to keep the solution running, troubleshoot and diagnose problems, and perform preventive maintenance. This book includes preferred practices, tips and techniques, and general suggestions for administrators of IBM Intelligent Operations Center on-premises deployments. For related information about this topic, refer to the following IBM Redbooks publications: IBM Intelligent Operations Center for Smarter Cities Redpaper, REDP-4939 IBM Intelligent Operations Center for Smarter Cities Solution Guide