Skip to main content

By clicking Submit, you agree to the developerWorks terms of use.

The first time you sign into developerWorks, a profile is created for you. Select information in your profile (name, country/region, and company) is displayed to the public and will accompany any content you post. You may update your IBM account at any time.

All information submitted is secure.

  • Close [x]

The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerworks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

By clicking Submit, you agree to the developerWorks terms of use.

All information submitted is secure.

  • Close [x]

developerWorks Community:

  • Close [x]

A sweeping approach to security

An IBM Redbooks Point-of-View publication

Photo of Chung Sheng Li
Chung Sheng Li is a Director in Commercial Systems at IBM Research. He is based in the IBM Research lab at Yorktown Heights, NY.
Katsumi Ohnishi (OHNK@jp.ibm.com), IBM Executive Architect, IBM
Photo of Katsumi Ohnishi
Katsumi Ohnishi is an IT Executive Architect for IBM Global Technology Services. He is based in Tokyo, Japan.
Photo of J.R. Rao
J.R. Rao is a Director in IBM Research. He is based in the IBM Research lab at Yorktown Heights, NY.

Summary:  Explore various security steps to help you create a broader security approach for your organization. Learn how you can anticipate and stop attackers from infiltrating your system.

Date:  19 Feb 2013
Level:  Intermediate

Activity:  3203 views
Comments:  

Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be protected. Consequently, organizations increasingly need to implement a smarter approach that relies on fine-grained control of access privileges and far field detection of potential and seemingly unrelated threats. Such an approach must also rely on multitier containment methods to isolate intrusions and to minimize damage.

To adopt a broad security approach that anticipates and stops attackers from infiltrating your system, consider the following approaches:

  • Change your security paradigm from perimeter control to a fine-grained data-centric security continuum.
  • Shift your solution from products to an integrated, comprehensive security intelligence approach.
  • Implement security intelligence to mitigate risks from growing data volume, proliferation of clouds and mobile users, and web technologies.

This IBM® Redbooks® Point-of-View publication describes approaches to security solutions.


Resources

Learn

Get products and technologies

  • Evaluate IBM products in the way that suits you best: Download a product trial, try a product online, use a product in a cloud environment, or spend a few hours in the SOA Sandbox learning how to implement Service Oriented Architecture efficiently.

Discuss

  • Get involved in the developerWorks community. Connect with other developerWorks users while exploring the developer-driven blogs, forums, groups, and wikis.

About the authors

Photo of Chung Sheng Li

Chung Sheng Li is a Director in Commercial Systems at IBM Research. He is based in the IBM Research lab at Yorktown Heights, NY.

Photo of Katsumi Ohnishi

Katsumi Ohnishi is an IT Executive Architect for IBM Global Technology Services. He is based in Tokyo, Japan.

Photo of J.R. Rao

J.R. Rao is a Director in IBM Research. He is based in the IBM Research lab at Yorktown Heights, NY.

Report abuse help

Report abuse

Thank you. This entry has been flagged for moderator attention.


Report abuse help

Report abuse

Report abuse submission failed. Please try again later.


developerWorks: Sign in


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Select information in your profile (name, country/region, and company) is displayed to the public and will accompany any content you post. You may update your IBM account at any time.

Choose your display name

The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


Rate this article

Comments

static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security
ArticleID=857861
ArticleTitle=A sweeping approach to security
publish-date=02192013