Home > General > IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager
21%
IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting.

In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

About the Author
Axel Buecker is a Certified Consulting Software IT Specialist at the ITSO, Austin Center. He writes extensively and teaches IBM classes worldwide about areas of software security architecture and network computing technologies. He has a degree in Computer Science from the University of Bremen, Germany. He has 23 years of experience in a variety of areas related to workstation and systems management, network computing, and e-business solutions. Before joining the ITSO in March 2000, Axel worked for IBM in Germany as a Senior IT Specialist in Software Security Architecture.

Jose Amado is a Senior Level 2 Support Engineer and consultant. He is the Tivoli Security Information and Event Manager and Tivoli Compliance Insight Manager Level 2 Technical Team lead. He works for IBM US in Guatemala. Jose has 12 years of experience with IT security solutions, and he has several certifications. For six years he has worked with Tivoli Security Information and Event Manager-related products and has been part of many international deployment projects for Security Information and Event Management (SIEM) solutions. Jose participated in beta testing of various versions of the product and worked on networking infrastructure designs for customers.

David Druker is an IBM Security Architect and works with IBM customers in central and western United States. He is known worldwide as an expert in IBM Tivoli Directory Integrator and has designed many solutions around this product. He has over 20 years of broad technology experience in security, programming, and enterprise architecture. David is a Senior Certified IT Specialist and holds a Ph.D. in Speech and Hearing Science from the University of Iowa.

Carsten Lorenz is a certified Senior Managing Consultant at IBM in the United Kingdom (UK). He manages security solutioning in large and complex IT infrastructure outsourcing engagements for customers throughout Europe, Middle-East and Africa. He has more than 10 years of experience in the security and compliance field, specializing in the areas of Security Management, IT Risk Assessment, Governance, and Operational Risk Management. Carsten performs consulting engagements with IBM customers in various industries, ranging from fortune 500 to small-to-medium sized businesses. Carsten is a CISSP, CISM, and a CISA, and he has a Bachelors Degree in European Studies from the University of Wolverhamption, UK, and a Diploma in Business Science from the University of Trier, Germany.

Frank Muehlenbrock is an IBM Information Security Manager with international experience in IT Security, Data Privacy and Risk and Compliance Management. He has 23 years of experience in the IT industry. Frank developed and implemented many IT security policies, processes, and procedures. He also conducted physical and logical security audits on a European scale. Frank has an Information Management degree from the Fachhochschule Reutlingen, Germany. He has a CISM certification of the ISACA organization and an MCSE and MCT. Frank co-authored three previous IBM Redbooks publications about IBM Tivoli Compliance Insight Manager. He also published technical articles in German journals and a book about implementing security guidelines. He is currently working on another book for the ISACA German chapter about the "Usage of Forensics in an Audit Organization".

Rudy Tan is a Senior IT-Specialist who works as a technical course developer in the IBM Tivoli Lab in Delft, Netherlands. He has 17 years of experience in the IT industry with a focus on security. In the past 12 years, Rudy worked at Consul as a Tivoli Compliance Insight Manager developer, consultant, and trainer.

Table Of Contents.

  • Part 1. Architecture and design
  • Chapter 1. Business context for IT security compliance management
  • Chapter 2. Designing an IT security compliance management solution
  • Chapter 3. Introducing the IBM Security Information and Event Management solution
  • Chapter 4. IBM Tivoli Security Information and Event Manager component structure
  • Chapter 5. Compliance management solution design
  • Part 2. Customer environment
  • Chapter 6. Introducing X-Y-Z Financial Accounting
  • Chapter 7. Compliance management design
  • Chapter 8. Basic auditing
  • Chapter 9. Extending auditing to other supported platforms
  • Chapter 10. Customized and regulatory reporting
  • Chapter 11. System z integration
  • Chapter 12. Custom event source integration
  • Appendix A. Corporate policy and standards
  • Appendix B. Additional material

  • Best Sellers



    Product Details
    • ISBN-13: 9789350230756
    • Publisher: IBM Redbooks
    • Publisher Imprint: IBM Redbooks
    • Language: English
    • ISBN-10: 9350230755
    • Publisher Date: 08 Jan 2010
    • Binding: Paperback
    • No of Pages: 464

    Related Categories

    Similar Products

    How would you rate your experience shopping for books on Bookswagon?

    Add Photo
    Add Photo

    Customer Reviews

    REVIEWS           
    Click Here To Be The First to Review this Product
    IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager
    IBM Redbooks -
    IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    IT Security Compliance Management Design Guide: with IBM Tivoli Security Information and Event Manager

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals



      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!