SELF-PROTECTING

Prev don't be afraid of buying books Next

A self-protecting IT environment must take appropriate actions automatically to make itself less vulnerable to attacks on its runtime infrastructure and business data. These attacks—which often occur on a daily basis—can take the form of unauthorized access and use, malicious viruses that can reformat hard drives and destroy business data, and denial-of-service attacks that can cripple critical business applications. A combination of security management tools and storage management tools are necessary to deal with these threats. Security management tools can help businesses consistently enforce security and privacy policies, help reduce overall security administration costs, and help increase employee productivity and customer satisfaction. Critical configuration changes and access-control changes should only occur with the right approvals. Tools should detect violations of security policy, and if necessary, automated actions should be taken to minimize risk to IT assets. Tivoli software storage management tools help enable businesses to automatically and efficiently back up and protect business data. Autonomic security and storage solutions provide administrators with a way to create policy definitions and express event correlation and automation knowledge.

Tivoli software products that can be used to implement a self-protecting environment include the following:

  • Tivoli Storage Manager

    The Storage Manager self-protects by automating backup and archival of enterprise data across heterogeneous storage environments. Scaling to protect thousands of computers running a dozen operating system platforms, its intelligent data movement and store techniques and comprehensive automation help reduce administration costs and increase service levels.

  • Tivoli Access Manager

    The Tivoli Access Manager family of products self-protects by helping prevent unauthorized access, using a single security policy server to enforce security across multiple file types, applications, devices, operating systems, and protocols. It supports a broad range of user authentication methods, including Web single sign-on, and has the ability to control access to many types of resources for authenticated users.

  • Tivoli Identity Manager

    The Identity Manager self-protects by centralizing identity management, integrating automated workflow with business processes, and leveraging self-service interfaces to increase productivity.

  • Tivoli Risk Manager

    The Risk Manager provides system-wide self-protection by assessing potential security threats and automating responses, such as server reconfiguration, security patch deployment, and account revocation. It collects security information from firewalls, intrusion detectors, and other vulnerability scanning tools with security checkpoints. It simplifies and correlates the vast number of events and alerts generated by numerous security point products and quickly identifies the real security threats to help administrators respond with adaptive security measures.

  • IBM Tivoli Privacy Manager for e-business

    Tivoli Privacy Manager for e-business self-protects by automating many privacy-compliance activities, simplifying the incorporation, monitoring and enforcement of privacy policy into business processes. It can record an end user's opt-in and opt-out choices according to the policy, can be used to monitor and enforce access according to the privacy policy, and can create audit trail reports.

Figure 15.5 shows the Tivoli products that provide the four facets of autonomic computing.

Figure 15.5. Tivoli autonomic software products.

graphics/15fig05.jpg




Amazon


Autonomic Computing
Autonomic Computing
ISBN: 013144025X
EAN: 2147483647
Year: 2004
Pages: 254
Authors: Richard Murch

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net