Content Library

Content Library

Content Library
Welcome to the Tivoli User Community Content Library. Download from a growing body of whitepapers, documents, videos and recordings of webinars and user group presentations by leading experts and fellow community members.
Type Title Down-
loads
User
Rating

Eurekify Identity Management and Compliance Projects

41 3

ITIM-TAM-Synergies

51 12

IBM Tivoli Monitoring v6.2.2

46 12

TSM FastBack Update and Roadmap: CTSMUG April 2010

41 8

Fastback & TSM Updates: CTSMUG April 2010 meeting

33 2

SecureIT presentation of ING use case - May 10

Posted by a user from the European IBM Tivoli Security User Group.
31 1

European IBM Tivoli Security User Group 2010 Introduction Presentation

Posted by a user from the European IBM Tivoli Security User Group.
40 3

Nordea presentation - May 10

Posted by a user from the European IBM Tivoli Security User Group.
36 1

IBM Security Strategy Update - May 10

Posted by a user from the European IBM Tivoli Security User Group.
36 3

IBM Tivoli IAM Governance - LCA - May 10

Posted by a user from the European IBM Tivoli Security User Group.
45 4

Proactive Protection and Compliance - CB RS - May 10

Posted by a user from the European IBM Tivoli Security User Group.
46 2

Risk, Audit and Compliance - NB - May 10

Posted by a user from the European IBM Tivoli Security User Group.
33 2

2010 IBM European Security User Group Customer Support & Services Update

Posted by a user from the European IBM Tivoli Security User Group.
47 3

X-Force Trend Report May 2010 - JPB

Posted by a user from the European IBM Tivoli Security User Group.
26 0

zOS Security Management - RVH - May 10

Posted by a user from the European IBM Tivoli Security User Group.
32 0

IT Security Challenges and Solutions: NYMTUG Presentations June 2010 Part 1

36 2

Identificando e contendo ataques DDOS

35 0

Contendo ataques DDOS - 8 TUG MF TIM CELULAR Marcelo Moretto

Posted by a user from the Tivoli Users Group – Mainframe - Brasil.
148 1

Auditoria Contínua de Segurança - Tivoli Security

46 0

IBM Identity Management Follow-Up Discussion - LCA - July 10

Posted by a user from the European IBM Tivoli Security User Group.
60 13

ITIM – SSM - 4690

38 3

BigFix Overview

33 3

Big Fix

39 4

Security for the Smarter Planet IBM Perspective and Security Strategy

36 0

Segurança em ambientes Virtualizados com IBM Security Virtual Server Protection for VMWare

31 0

TIvoli BigFix Technical Overview

35 3

Tivoli Security on z.pdf - Eli Martins - 9 TUG 4

Posted by a user from the Tivoli Users Group – Mainframe - Brasil.
31 1

Tivoli Endpoint Manager

64 14

Identity Management – A Success Story

64 13

IBM Security Network Intrusion Prevention System

IBM Security Network Intrusion Prevention solutions provide comprehensive protection while reducing the...
34 3

IBM X-Force 2010 Trend and Risk Report

This report provides statistical information about all aspects of threats that affect Internet security...
34 2

IBM Tivoli Endpoint Manager: Overview for Federal

IBM Tivoli Endpoint Manager is a comprehensive solution streamlined for achieving real-time visibility...
35 6

IBM Tivoli Endpoint Manager: Control for Retail Environments

IBM Tivoli Endpoint Manager, built on BigFix technology, provides centralized and automated capabilities...
39 6

Select the Right Solution for Endpoint Management

IBM Tivoli Endpoint Manager can help organizations improve endpoint visibility, speed and simplify software...
32 5

IBM Tivoli Endpoint Manager for Core Protection

IBM Tivoli Endpoint Manager for Core Protection delivers real-time protection from malware and other...
42 4

IBM Security Blueprint - SVD - May 11

Posted by a user from the European IBM Tivoli Security User Group.
41 1

OAuth Introduction - JH - May 11

Posted by a user from the European IBM Tivoli Security User Group.
37 3

Recent enhancements to Tivoli Access Manager for e-business - JH - May 11

Posted by a user from the European IBM Tivoli Security User Group.
42 5

Security Threats - MC

Posted by a user from the European IBM Tivoli Security User Group.
34 2

European IBM Tivoli Security User Group 2011 Introduction

Posted by a user from the European IBM Tivoli Security User Group.
80 2

Achieving Continuous Monitoring with the IBM Security Framework - IBM Security Solutions

IBM Security Solutions offers a comprehensive set of services, software and hardware to help achieve...
73 9

Ensuring the Health of Endpoints in Healthcare IT - IBM Tivoli Endpoint Manager

IBM Tivoli Endpoint Manager, built on BigFix technology, delivers centralized and automated capabilities...
34 4

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance - Thought Leadership White Paper

This paper describes how IBM Tivoli Endpoint Manager for Security and Compliance, built on BigFix technology...
38 5

IBM Security Network IPS GX 7800 e novos desenvolvimentos tecnológicos

104 2

Segurança de Endpoint através do Tivoli Endpoint Manager

36 0

Analyst Report - The Total Economic Impact of IBM Tivoli Endpoint Manager

This Forrester analyst report analyzes the financial impact and value IBM Tivoli Endpoint Manager brings...
65 12

Tivoli Security Presentation at Delhi TUG

66 6

IBM Tivoli Endpoint Manager - Built on BigFix Technology

IBM Tivoli Endpoint Manager provides an efficient, cost effective way to understand and manage the status...
41 4

Tivoli Common Reporting New Cognos Components included in TCR 2.1 082311 Tivoli Users Group Colorado  

82 9

What is IBM Tivoli Endpoint Manager - built on BigFix Technology Colorado Tivoli Users Group August 23 2011

44 3

Continuous Monitoring, Remediation and CyberScope Reporting IBM Tivoli Endpoint Manager

Abstract: To assist federal agencies with the implementation of CyberScope reporting, IBM Tivoli Endpoint...
51 7

TAM ESSO introduction: India User Group-Pune

43 4

TAM ESSO introduction - Pune

104 6

Webcast Replay: Security Best Practices - Managing Risks in the Digital Age, Simplifying Identity and Access Governance with Effective Role Management in Tivoli Identity Manager - Oct-11

Role management is a powerful tool for user access administration and for restricting system access to...
146 8

Solution Brief - Efficiency, Security and Compliance for Energy and Utility Environments

• Efficiently manage endpoints for a large, mobile workforce • Provide visibility and control...
33 3

Solution Brief - Best practices for Improving HS&E, Reliability and Quality

The primary objective of Health, Safety, and Environment (HS&E) initiatives is to reduce overall...
49 10

IBM Tivoli Endpoint Manager for State and Local Government

On today’s smarter planet, which is more instrumented, integrated and intelligent, state and local...
43 10

IBM Tivoli Endpoint Manager for Telecommunications

• Accurately manage endpoints across widely distributed environments • Gain centralized control...
40 6

Thought Leadership White Paper Proactive Response to Today’s Advanced Persistent Threats

Introduction Answering threats with a rapid, effective response Protecting today’s complex, distributed...
45 3

Gestión de Puntos Finales con Tivoli Endpoint Manager

36 2

Presentación Grupo de Usuarios de Tivoli en Colombia - Beneficios

37 1

How Career Education Corp Leverages BigFix

37 1

TAM E-SSO Version 8.1 - Introduction

84 10

Video: Security as an Enabler for Cloud with Glen Gooding

59 0

Article: Security Essentials for CIOs — Enabling Mobility; Their device, Your data

59 3

Article: Security Essentials for the CIO - Embracing Innovation with Confidence

54 0

Whitepaper: Manage User Identities and Access in the Cloud - User Provisioning and Access Control to Protect Users and Data in Cloud Deployments

81 7

Report: EOS - Steps Towards Implementing a European Cyber-Security Strategy

61 1

Article: Cyber Security - Protecting the Public Sector

110 9

SecurIT wins the 2012 IBM Beacon Award for Outstanding Security Solution

Abstract: SecurIT, an experienced IBM business partner with a reputation for providing high quality security...
52 1

Data Sheet - IBM Security Virtual Server Protection for VMware

IBM Security Virtual Server Protection for VMware provides integrated threat mitigation to allow organizations...
61 12

IBM X-Force Threat Insight Quarterly

The IBM X-Force Threat Insight Quarterly is designed to highlight some of the most significant threats...
49 2

Data Sheet - IBM Proventia Desktop for Windows

IBM Proventia Desktop for Windows provides intelligent protection against both internal and external...
56 0

IBM Security Network Active Bypass

IBM Security Network Active Bypass offers failure-case protection to ensure the availability of networks...
58 1

Data Sheet - IBM Security SiteProtector System

IBM Security SiteProtector System addresses the challenge of complying with constantly changing security...
55 3

Flyer - Ease enforcement of NIST 800-53 security controls

IBM Endpoint Manager enables federal agencies to significantly lower the cost of enforcing compliance...
52 2

IBM Security Systems -TUG Bangalore-June 2012

40 9

Next_generation_IPS

33 5

Data Sheet - IBM Security Access Manager for Enterprise Single Sign-On

IBM Security Access Manager for Enterprise Single Sign-On software improves security by automating and...
84 19

Solution Brief - IBM Security Content Analysis Software Development Kit

IBM Security Content Analysis Software Development Kit delivers robust content inspection through a feature...
79 4

Solution Brief - Keeping distributed endpoints safe and compliant

IBM Endpoint Manager provides real-time visibility and control over the status of an organization’s...
18 2

Choosing the right virtualization security solution

While organizations typically have security measures in place for their physical IT assets, they’re...
22 5

IBM Security AppScan Enterprise

IBM Security AppScan Enterprise software is a web-based application security solution that engages all...
57 3

Data Sheet - IBM Security zSecure Manager for RACF z/VM

IBM Security zSecure Manager for RACF z/VM software helps unleash the potential of the mainframe by providing...
49 0

Data Sheet - IBM Security zSecure Administration

IBM Security zSecure Administration provides a comprehensive set of features for mainframe security administrators...
10 0

Thought Leadership White Paper - Intelligent role management for improved security and compliance

Role management is a cornerstone of identity and access management governance and enables organizations...
23 2

Data Sheet - IBM X-FORCE research and development team

The IBM X-FORCE team of security experts researches and evaluates vulnerabilities and security issues...
11 0

Data Sheet - IBM Security zSecure Compliance and Auditing

Today’s mainframe security managers understand that auditing is an essential method to prevent...
16 0

Thought Leadership White Paper - Ensuring application security in mobile device environments

As mobile device use in the workplace continues to increase, a top security priority for many organizations...
29 5

Solution Brief - IBM Security AppScan Source

IBM Security AppScan Source software is a static analysis security testing solution that enables you...
18 0

Solution Brief - Increase productivity and security with identity and access management

Ensuring security and maintaining compliance with regulations can be challenging. IBM Security identity...
37 11

Case Study: EXA Corporation creates a secure and resilient private cloud using IBM Cloud reference architecture

EXA faced the challenge of how to best secure and manage various servers located in multiple offices...
40 3

Data Sheet - IBM Security Network Intrusion Prevention System

IBM Security Network Intrusion Prevention solutions provide comprehensive protection while reducing the...
21 2

Solution Brief - Securing the mobile enterprise with IBM Security solutions

IBM offers a portfolio of mobile security solutions spanning IT domains—people, data, applications...
28 4

Solution Brief - Safeguarding the cloud with IBM Security solutions

To address concerns with reduced visibility into cloud data centers, control over security policies,...
19 2

Data Sheet - IBM Security Network Protection

IBM Security Network Protection offers a comprehensive, next-generation security solution that goes beyond...
21 1

Solution Brief - IBM Security intrusion prevention solutions

The IBM Security intrusion prevention solutions portfolio enables organizations to reach higher levels...
27 4

White Paper - Keeping federal assets safe with a proactive approach to threat protection

To protect vulnerable federal government agencies from cyber warfare and Internet-based attacks, IBM...
17 2

Flyer - Simplify and automate CyberScope reporting

IBM Security solutions help agencies respond to security incidents in near real time, enforce regulatory...
12 0

Exploring Federation Protocols

The presentation shared during the architecture workshop by Jon Harry
16 6

TrustBuilder

17 9

Mobile security session

22 5

Application and Data session: Securing the Dev-Ops Lifecycle

September 28th 2012 Caleb Barlow Director – Application, Data and Mobile Security IBM Security
47 13

Solution Brief - Simplify security management in the cloud

IBM Endpoint Manager and IBM SmartCloud solutions can play a key role in securing and maintaining your...
24 4

Data Sheet - IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage FlashCopy Manager software enables organizations to perform and manage frequent, near...
48 23

Solution Brief - IBM Security Privileged Identity Manager mitigates insider threats

IBM Security Privileged Identity Manager delivers a single solution for securing, automating and tracking...
31 1

Data Sheet - IBM Security Identity Manager

IBM Security Identity Manager is a comprehensive, policy-based identity and access governance solution...
61 14

IBM TIM ppt

IBM Tivoli Identity Manager - Overview presentation for the meeting held on 03rd Nov 2012 at Tivoli User...
33 9

White Paper - Avoiding insider threats to enterprise security

IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities...
31 3

Data Sheet - IBM Security zSecure CICS Toolkit

IBM Security zSecure CICS Toolkit enables you to perform mainframe administrative tasks or inquire into...
7 0

Data Sheet - IBM Security zSecure Admin

IBM Security zSecure Admin is a user-friendly layer on top of IBM RACF which enables security administration...
8 1

Data Sheet - IBM Security zSecure Command Verifier

IBM Security zSecure Command Verifier provides a policy enforcement solution that enforces compliance...
8 0

Data Sheet - IBM Security zSecure Audit

IBM Security zSecure Audit provides a compliance and audit solution that enables you to automatically...
17 0

Data Sheet - IBM Security zSecure Visual

IBM Security zSecure Visual reduces the need for scarce, RACF-trained expertise by providing a user-friendly...
8 0

Data Sheet - IBM Security zSecure Alert

IBM Security zSecure Alert provides real-time mainframe threat monitoring to help you detect intruders...
14 0

Data Sheet - IBM Security zSecure suite

The IBM Security zSecure suite is a mainframe security administration, compliance and audit family of...
11 0

White Paper - Get actionable insight with security intelligence for mainframe environments

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real...
6 1

Solution Brief - IBM Service Management Solutions for government

IBM Service Management Solutions for government empower departments and agencies to deliver service capabilities...
22 8

Data Sheet - IBM Security Host Protection

IBM Security Host Protection offers a comprehensive, integrated solution that delivers multilayered intrusion...
13 2

White Paper - Five steps to achieve success in your application security program

As more security threats target applications, organizations focus increasingly on application security...
18 1

Data Sheet - IBM Tivoli Key Lifecycle Manager

IBM Tivoli Key Lifecycle Manager is designed to help IT organizations better manage the encryption-key...
39 7

White Paper - Accelerating the deployment of a secure mobile enterprise

As enterprises become increasingly mobile and user behaviors, technical vulnerabilities and rapidly evolving...
26 4

Data Sheet - IBM Security Access Manager for Web

IBM Security Access Manager for Web is a highly scalable web access management and web application protection...
40 12

Data Sheet - IBM Security Web Gateway Appliance AMP 5100

The IBM Security Web Gateway Appliance is a highly scalable and configurable, easy-to-deploy integrated...
31 4

Introduction to 2013 User Group meeting in Copenhagen

19 2