7 conclusion – IBM Tivoli and Cisco User Manual

Page 28

Advertising
background image

10

Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Figure 1-2 depicts the relevant tasks in a life-cycle overview for endpoint
protection. All of the topics discussed in this chapter are represented at some
point in this life cycle.

Figure 1-2 Integrated endpoint protection

When an organization is responsible for maintaining and protecting customer
data, it must create measures to ensure policy compliance by all involved
systems on an automated and regular basis. Failure to meet this objective has
resulted in significant exposure and many lawsuits have been lost. It is better to
seem security-paranoid than to be ignorant.

More information about security compliance can be found in the IBM Redbook
Deployment Guide Series: IBM Tivoli Security Compliance Manager,
SG24-6450.

1.7 Conclusion

Organizations are constantly looking to maintain compliance status with their
corporate security policy for both inter-company and intra-company interactions.
Production losses and inefficiencies, and therefore substantial financial losses,
have resulted from noncompliance. Laws and government regulations such as

Privacy:
Secure Connectivity & Data

Protection:
Threat Defense

Control:

Trust & Identity

Infrastructure:

Secure Systems & Networks

Leverage core networking,

software, and systems

capabilities to address

security issues

Manage users and

devices in accordance

with security policy

Confidential delivery of
applications, voice,
data, and transactions

Minimize and manage
both known and
unknown threats

Policy Development and Assurance

Asset protection, privacy and reputation protection,

and regulatory compliance

Secure Monitoring and Management

Realize security policy through

integrated network, device, and security management

Advertising