Book description
The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle.
This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives.
The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it.
This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®.
This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.
Table of contents
- Front cover
- Notices
- Preface
-
Chapter 1. Overview of IBM MobileFirst and its security offerings
- 1.1 Business value of mobile technologies
- 1.2 IBM MobileFirst solution overview
- 1.3 Mobile security threats
- 1.4 Mobile application landscape
-
1.5 IBM MobileFirst Security solution outline
- 1.5.1 IBM Worklight platform as the basis for mobile security
- 1.5.2 User protection with IBM Security Access Manager
- 1.5.3 Application security testing with IBM Security AppScan
- 1.5.4 Delivery of services and applications with IBM WebSphere DataPower
- 1.5.5 Security intelligence with IBM Security QRadar SIEM
- 1.5.6 VPN software with IBM Mobile Connect
- Chapter 2. Business scenario used in this book
- Chapter 3. IBM Worklight security overview
- Chapter 4. Integrating Worklight with enterprise security
- Chapter 5. Applying Worklight security features
- Chapter 6. Integration with IBM Security Access Manager
- Chapter 7. Integration with IBM WebSphere DataPower
- Appendix A. Additional material
- Related publications
- Back cover
Product information
- Title: Securing Your Mobile Business with IBM Worklight
- Author(s):
- Release date: October 2013
- Publisher(s): IBM Redbooks
- ISBN: 9780738438887
You might also like
book
Extending IBM Business Process Manager to the Mobile Enterprise with IBM Worklight
In today's business in motion environments, workers expect to be connected to their critical business processes …
book
Certification Study Guide: IBM Tivoli Access Manager for e-business 6.0
This IBM Redbooks publication is a study guide for IBM Tivoli Access Manager for e-business Version …
book
Enterprise Caching Solutions using IBM WebSphere DataPower SOA Appliances and IBM WebSphere eXtreme Scale
In the dynamic business environment of today, Information Technology (IT) organizations face challenges around scalability and …
book
IBM WebSphere V5.0 Security: WebSphere Handbook Series
This IBM Redbook provides IT Architects, IT Specialists, application designers, application developers, application assemblers, application deployers …