Book description
The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle.
This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives.
The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it.
This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®.
This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.
Table of contents
- Front cover
- Notices
- Preface
-
Chapter 1. Overview of IBM MobileFirst and its security offerings
- 1.1 Business value of mobile technologies
- 1.2 IBM MobileFirst solution overview
- 1.3 Mobile security threats
- 1.4 Mobile application landscape
-
1.5 IBM MobileFirst Security solution outline
- 1.5.1 IBM Worklight platform as the basis for mobile security
- 1.5.2 User protection with IBM Security Access Manager
- 1.5.3 Application security testing with IBM Security AppScan
- 1.5.4 Delivery of services and applications with IBM WebSphere DataPower
- 1.5.5 Security intelligence with IBM Security QRadar SIEM
- 1.5.6 VPN software with IBM Mobile Connect
- Chapter 2. Business scenario used in this book
- Chapter 3. IBM Worklight security overview
- Chapter 4. Integrating Worklight with enterprise security
- Chapter 5. Applying Worklight security features
- Chapter 6. Integration with IBM Security Access Manager
- Chapter 7. Integration with IBM WebSphere DataPower
- Appendix A. Additional material
- Related publications
- Back cover
Product information
- Title: Securing Your Mobile Business with IBM Worklight
- Author(s):
- Release date: October 2013
- Publisher(s): IBM Redbooks
- ISBN: 9780738438887
You might also like
book
DataPower SOA Appliance Administration, Deployment, and Best Practices
This IBM® Redbooks® publication focuses on operational and managerial aspects for DataPower® appliance deployments. DataPower appliances …
book
Robust Data Synchronization with IBM Tivoli Directory Integrator
Don’t be fooled by the name; IBM Tivoli Directory Integrator integrates anything, and it is not …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …