IBM Tivoli and Cisco manual Business context

Models: Tivoli and Cisco

1 516
Download 516 pages 58.69 Kb
Page 29
Image 29

those mentioned in 1.2, “Why we need this” on page 5, mandate every organization to comply with regulatory acts. Keys to greater productivity include identifying authorized users and providing them easier access to network and system resources while keeping them compliant.

The IBM Integrated Security Solution for Cisco Networks delivers corporate compliance at a reduced cost. The IBM Integrated Security Solution for Cisco Networks enables organizations to identify users, monitor their compliance, offer them an easy and centralized remediation capability in case of noncompliance, and easily route them into appropriate network zones based on their credentials.

IBM and Cisco have recognized inter-company and intra-company security compliance problems. This approach enables corporations to implement a

simplified, compliance-based full life-cycle Network Admission Control and remediation solution that can result in greater productivity, consistency, and ease

of user administration. It also enables the corporate auditors and administrators to have powerful controls in place for partners and contractors.

It is of utmost importance for every employee in an organization to be conscious of and in adherence with corporate security policies to provide end-to-end security across the gamut of IT services. Organizations must provide security education to all employees and continuously update on a regular basis; every

employee from the CEO on down must comply. Security is the responsibility of every employee, not just the holder of the security job title.

In the next chapter we introduce the architecture and design methodologies for the IBM Integrated Security Solution using Cisco Networks.

Chapter 1. Business context

11

Page 29
Image 29
IBM Tivoli and Cisco manual Business context