Designing for security
In this chapter, we describe the unique security risks introduced by mobile devices and discuss the various steps that you can use to address these risks. We review the security solutions that can be used to secure mobile access to System z.
We compare several System z mobile security topologies:
•Using IBM Worklight security
•DataPower as a policy enforcement point
•DataPower as a reverse proxy for Worklight server
•DataPower XI50z as a second security layer
•IBM Security Access Manager as a policy enforcement ...