Feeds

Tivoli integrates compliance management

Automated tool contrast policies with behaviour

Security for virtualized datacentres

IBM has finally finished digesting Consul InSight, the risk management software that it bought last December, and has re-released it in expanded form as Tivoli Compliance Insight Manager.

Now linked into other Tivoli products, such as Security Operations Manager, Identity Manager and Access Manager, the updated software allows companies to track, report and investigate non-compliant behaviour across the enterprise by automatically comparing user activity to defined policies, Big Blue claimed.

TCIM's integration with the other Tivoli elements now allows it to report on and audit the actions of privileged users - for example, taking detailed notes when a system administrator changes a user's role or authorisation level. It also lets it import user and security logs and analyse them for long-term trends, and recognise and respond to attacks in real-time.

The software includes a compliance dashboard and a number of standard regulatory audit and compliance reports. Custom reports can be created and distributed via its policy and report definition mechanisms.

Due to go on sale next Friday, TCIM also supports the needs of auditors by translating captured security data into a common format that can be understood even if the auditor is not intimately familiar with the area of the business where is was collected, IBM said.

Kristin Lovejoy, IBM's head governance and risk management strategist, claimed that the only way to get business value from compliance management was to automate and consolidate it. She quoted a Gartner estimate that using separate tools for each regulatory challenge could cost ten times as much as an integrated approach to compliance.

"Companies today are dealing with an increasingly complex regulatory environment, along with growing IT environments and increasing demands to run secure and highly resilient businesses," she said. She added that TCIM "provides a valuable, automated management tool for improved organisational efficiency and fast response to security and compliance violations."®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.