Redbook: Enterprise Security Architecture using IBM ISS Security Solutions

Threats come from a unique variety of sources. Insider threats, as well as malicious hackers are not only difficult to detect and prevent, but many times they have been using resources without the business even aware they are there.

This IBM Redbook deliverable describes the various threats and how to prevent them through a distributed array of protection technologies and services. We take a closer look at preemptive security that is designed to stop Internet threats before they can impact networks. We also explore technologies that can help complement threat mitigation techniques such as identity management solutions as well as network mapping tools and behavior techniques.

This book is a valuable resource for senior officers, architects as well as C level executives who want to understand and implement enterprise security following architectural guidelines.

Table of Contents

Part 1. Terminology and infrastructure

  • Chapter 1. Business context
  • Chapter 2. Common security architecture and network models
  • Chapter 3. IT threat mitigation concept.

Part 2. Threat mitigation components

  • Chapter 4. Security intelligence and research
  • Chapter 5. Centralized Management
  • Chapter 6. Network intrusions and anomalies
  • Chapter 7. Vulnerability management
  • Chapter 8. E-mail, instant messaging and Web content security
  • Chapter 9. Host security solutions
  • Chapter 10. Managed Security Services

Part 3. Business scenarios

  • Chapter 11. Threat mitigation deployment guide
  • Chapter 12. Business scenarios

Part 4. Appendixes

  • Appendix A. Method for Architecting Secure Solutions
  • Appendix B. Base technologies

Download the Redbook here.


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s