O'Reilly logo

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security by Serge Vereecke, Stefaan Van Daele, Gretchen Marx, Christian Mark, Mark Johnston, Vladimir Jeremic, Jaco Jacobs, Jan Flegr, Peter Brittenham, Martin Borrett, Brian Blackshaw, Saritha Arunkumar, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Business scenario for the Mobile Device Security solution pattern
This chapter introduces a typical business scenario of a fictional cardio healthcare company, referred to as the cardio healthcare company or the company. It shows how the company can use the IBM Security Framework and IBM Security Blueprint to help secure and facilitate their usage of mobile devices.
This chapter includes the following sections:
5.1 Company overview
The cardio ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required