IBM Tivoli and Cisco Network Card User Manual


 
10 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
Figure 1-2 depicts the relevant tasks in a life-cycle overview for endpoint
protection. All of the topics discussed in this chapter are represented at some
point in this life cycle.
Figure 1-2 Integrated endpoint protection
When an organization is responsible for maintaining and protecting customer
data, it must create measures to ensure policy compliance by all involved
systems on an automated and regular basis. Failure to meet this objective has
resulted in significant exposure and many lawsuits have been lost. It is better to
seem security-paranoid than to be ignorant.
More information about security compliance can be found in the IBM Redbook
Deployment Guide Series: IBM Tivoli Security Compliance Manager,
SG24-6450.
1.7 Conclusion
Organizations are constantly looking to maintain compliance status with their
corporate security policy for both inter-company and intra-company interactions.
Production losses and inefficiencies, and therefore substantial financial losses,
have resulted from noncompliance. Laws and government regulations such as
Privacy:
Secure Connectivity & Data
Protection:
Threat Defense
Control:
Trust & Identity
Infrastructure:
Secure Systems & Networks
Leverage core networking,
software, and systems
capabilities to address
security issues
Manage users and
devices in accordance
with security policy
Confidential delivery of
applications, voice,
data, and transactions
Minimize and manage
both known and
unknown threats
Policy Development and Assurance
Asset protection, privacy and reputation protection,
and regulatory compliance
Secure Monitoring and Management
Realize security policy through
integrated network, device, and security management