If you think monitoring privileged identities is important and are investing your blood sweat and tears into a set of systems and processes to monitor them, the last thing you want is for the IT infrastructure that's crucial to all that to fail. Aanchal Sinha, Nitesh Mehare, and Santosh Ankushkar have just published a new white paper, "Con
Abstract for the paper:
Installing IBM Privileged Identity Manager (ISPIM) virtual appliance takes away the complexity in installing and configuring three separate products. It is recommended to create cluster of ISPIM virtual appliances to provide high availability for business users. This white paper talks about requirements for setting up a cluster and provides step-by-step guide to installing and configuring a popular, open source load balancer for ISPIM cluster.
developerWorks just published a video interview with Jack Danahy discussing the 2013 Global Reputational Risk and IT Study.
The IBM® Global Reputational Risk and IT Study is one of the largest studies ever conducted to examine the relationship between IT and reputational risk. The initial group of 427 respondents participated in a survey conducted for IBM by the Economist Intelligence Unit. An additional 175 respondents participated in the study online at a special IBM survey website. All participants answered questions specifically designed to provide a detailed picture of the connection between reputational risk and IT in business today—including which IT risks have the most impact on reputation, whether these risks are being managed effectively, and identifying the gaps that need to be closed.