beautypg.com

Back cover, Building a network access control solution, With ibm tivoli and cisco systems – IBM Tivoli and Cisco User Manual

Page 516

background image

®

SG24-6678-01

ISBN 0738489883

INTERNATIONAL
TECHNICAL
SUPPORT
ORGANIZATION

BUILDING TECHNICAL
INFORMATION BASED ON
PRACTICAL EXPERIENCE

IBM Redbooks are developed by
the IBM International Technical
Support Organization. Experts
from IBM, Customers and
Partners from around the world
create timely technical
information based on realistic
scenarios. Specific
recommendations are provided
to help you implement IT
solutions more effectively in
your environment.

For more information:
ibm.com
/redbooks

Building a Network
Access Control Solution

with IBM Tivoli and Cisco Systems

Covering Cisco
Network Admission
Control Framework
and Appliance

Automated
remediation of
noncompliant
workstations

Advanced security
compliance
notification

The increasing number of endpoints used to access a network
in any enterprise environment can greatly affect security.
Endpoints that connect to the enterprise and are corrupted in
some way can infect other parts of the enterprise and cause
significant IT infrastructure damage and loss of productivity.
Additionally, organizations must address security compliance
as they are faced with an increasing numbers of internal,
industry, and government policies, standards, and
regulations.

This IBM Redbook discusses the IBM Integrated Security
Solution for Cisco Networks, which offers a security-rich,
policy-based security compliance and remediation solution
for small, medium, and large businesses. We explain how
administrative tasks can be simplified by centralizing the
administration of defined security policies, automating
security policy enforcement and execution, and automating
endpoint security scans. As a result we can create
notifications of security compliance vulnerabilities,
quarantine, and automatically remediate noncompliant
workstations before a potential security incident occurs.

This book is targeted at security professionals, architects, and
senior security and IT managers to provide valuable
architectural, technical, and planning information.

Back cover