IBM Host Integration In a Secure Network: A Practical Approach

TOP : Networking

IBM Host Integration In a Secure Network: A Practical Approach

By their very nature, e-business applications are more vulnerable to attack than any type of previous I/T system. Security needs to be at the heart of these systems because the costs of getting it wrong can be enormous. The publicity associated with a breach of security reduces customer, supplier and Business Partner confidence in the enterprise and the share price plummets. There also may be actual monetary theft, or confidential information might be compromised. Whatever the details, the result is a loss to the business, and in the extreme case, the loss of the business itself.

Appropriate security needs to be in place for all systems - whether they are simply company Web pages with no access to the company intranet at all, or full-blown customer-to-business or business-to-business systems with external customers or partners having access to company systems. In this redbook, we show some of the best security solutions in which IBM Host Integration can operate.

Network security is implemented to protect two objects: (1) the data that is transmitted on the network, and (2) the computers that are connected to the network. This Redbook is directed at I/T managers and architects planning for, or implementing, an IBM Host Integration solution. It explores aspects of network security while implementing an IBM Web-to-host host integration solution, consisting of IBM WebSphere Host On-Demand and IBM WebSphere Host Publisher. It describes the native security capabilities of each product and how they may be used by themselves and with other network security products to provide a secure environment.
Price: $48.00 $38.00
Pages: 294
Date Published: July 26, 2001
ISBN: 0738419303
Author: IBM Redbooks
Product Number: SG24-5988-00
Ships in 3-5 days
Return to category
Why Vervante?

© 2024 Vervante Corporation. All rights reserved.