Enterprise Security

System z® is the most inherently secure platform with great levels of controls, isolations and protections built into all layers - the hardware, operating systems, middleware, management, LPAR & virtual machines workloads and internet-attached Web Services. The platform security capabilities were further advanced to satisfy compliance to new business policies, external regulations and enforcement of security governance.

System z well-advanced, matured and tested enterprise-grade capabilities allow you to attain superior security, regulatory compliance and governance without constraining your business performance. The breadth of z security and the granularity of its controls could sway you to reevaluate the way you go about the how, what and where in deploying your enterprise’s security.

Leveraging IBM security products and solutions portfolio, we work with you to provide you with services, software and hardware solutions to support your efforts in addressing and deploying enterprise security capabilities for your business. We assist you in developing a roadmap that aids you in designing and deploying security solutions in your own organization.

 

The Big Picture of Security Requirements & Initiatives

First you need to capture the big picture of your enterprise security requirements, and then you must address them in sync with your operational business requirements. Meeting the needed levels of service and providing the sufficient security must be done both and done well. Your challenge is to serve applications and data well and safeguard them, the users, and your infrastructure.

The four pillars of enterprise security are risk assessment, access control, monitoring, and defense. These four areas must be effectively addressed without constraining the business.

Risk Assessment:

Risk assessment should be robust and broad enough to be certain that the entire scope of enterprise security concern is covered and addressed with consistent policies. You must determine where security is required and develop a roadmap to help you in designing and deploying integrated security solutions across your organization. A working security strategy for large expanding enterprise can be achieved by protecting everything under one set of mutual but wide-range security policies and by applying a high level of security to all components. Then the degree of such protection and some constraints can be contracted and reduced on particular applications, processes, users, and resources where business requirements can qualify and allow such exceptions and certain authorizations need to be granted.

A business-driven holistic approach that weighs the business goals and performance in joint with the technical requirements and constraints for security enforcement is required to assess and manage the business risks.

Access Control:

Access control is crucial for securing the enterprise because prohibited access is a doorway to utmost risks. Identity authentication and access management must be enforced across the entire enterprise and be coordinated among its separated divisions and parts.

Monitoring:

Even with well enforced access controls and robust risk assessment, monitoring capability is required because security breaches can happen with authorized users and new security threats will suddenly appear as business processes expand and leap. The enterprise should have a broad intelligence and feel of what is happening within its IT environment borders through auditing and capabilities for collecting more widely useful and actionable security information and identifying of what is unusual. Monitoring, audit and alert capabilities can enforce limits on what IT administrators and systems programmers can do and can observe processes in their leaps across the business firm and can alert on security violations and business policy exceptions.

Defense:

Safeguards and layers of defense such as encryption, intrusion prevention services and web application vulnerability scanning should be added to defend against and mitigate many risks that cannot be avoided. Such safeguards are crucial for ensuring that all the internet-based business processes are reliantly secure and efficient.