IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager - IBM Redbooks

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

By IBM Redbooks

  • Release Date: 2010-07-16
  • Genre: Computers

Book Synopsis

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

Tags in Computers : IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IBM Redbooks ebook , IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IBM Redbooks epub , IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IBM Redbooks AUDIOBOOK , IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager by IBM Redbooks ePub (.epub) , IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager book review , Computers