Integration Security Part 1 of 2: Are your IMS z Assets Safe in a Cloud and Mobile World?
Project and Program:
Information Management,
Information Management Systems
Tags:
Proceedings ,
2018 ,
SHARE St. Louis 2018
As integration technologies continue to expand, the focus on web services, REST APIs, mobility, and the cloud
could expose your existing enterprise assets and resources to greater risks. This presentation describes
the available mechanisms that can protect your IMS business logic and data from attacks. It describes the
levels of protection that can be invoked when sending requests from open systems of engagement to your
valued systems of record, the gateways where security is implemented, the auditability of access,
the identity mechanisms that can be invoked, and even the option of using Multifactor authentication.-Suzie M. Wendler-IBM Corporation
Back to Proceedings File Library