A sweeping approach to security
An IBM Redbooks Point-of-View publication
Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be protected. Consequently, organizations increasingly need to implement a smarter approach that relies on fine-grained control of access privileges and far field detection of potential and seemingly unrelated threats. Such an approach must also rely on multitier containment methods to isolate intrusions and to minimize damage.
To adopt a broad security approach that anticipates and stops attackers from infiltrating your system, consider the following approaches:
- Change your security paradigm from perimeter control to a fine-grained data-centric security continuum.
- Shift your solution from products to an integrated, comprehensive security intelligence approach.
- Implement security intelligence to mitigate risks from growing data volume, proliferation of clouds and mobile users, and web technologies.
This IBM® Redbooks® Point-of-View publication describes approaches to security solutions.
- Read "A Sweeping Approach to Security: An IBM Redbooks Point-of-View publication", published November 29, 2012 by IBM Redbooks.
- Read "IBM X-Force Trend and Risk Reports" to learn more on how to be ready as new threats emerge.
- Read "IBM Institute for Advanced Security Blog" to learn what global security leaders have to share.
- Read "Security in Development: The IBM Secure Engineering Framework" to learn about secure engineering practices for software products.
- Evaluate IBM products in the way that suits you best: Download a product trial, try a product online, use a product in a cloud environment, or spend a few hours in the SOA Sandbox learning how to implement Service Oriented Architecture efficiently.