IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Author :
Publisher : IBM Redbooks
Total Pages : 464
Release :
ISBN-10 : 9780738434469
ISBN-13 : 0738434469
Rating : 4/5 (69 Downloads)

Book Synopsis IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager by : Axel Buecker

Download or read book IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager written by Axel Buecker and published by IBM Redbooks. This book was released on 2010-07-16 with total page 464 pages. Available in PDF, EPUB and Kindle. Book excerpt: To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.


IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager Related Books

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Language: en
Pages: 464
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2010-07-16 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices frame
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Language: en
Pages: 494
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2011-08-18 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastr
IBM I Security Administration and Compliance
Language: en
Pages: 0
Authors: Carol Woodbury
Categories: Computers
Type: BOOK - Published: 2016-05-11 - Publisher:

DOWNLOAD EBOOK

In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything you need to know about IBM i se
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
Security Guide for IBM i V6.1
Language: en
Pages: 426
Authors: Jim Cook
Categories: Computers
Type: BOOK - Published: 2009-05-29 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as a