Skip to main content

Securing Your Mobile Business with IBM Worklight

An IBM Redbooks publication

thumbnail 

Published on 08 October 2013

  1. .EPUB (3.4 MB)
  2. .PDF (2.6 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 073843888X
ISBN-13: 9780738438887
IBM Form #: SG24-8179-00


Authors: Scott Andrews, Juarez Barbosa Junior, Virginijus Kaminas, Jia Lei Ma, Dale Sue Ping and Madlin Seidel

    menu icon

    Abstract

    The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle.

    This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives.

    The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it.

    This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®.

    This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.

    Related blog posts

    Table of Contents

    Chapter 1. Overview of IBM MobileFirst and its security offerings

    Chapter 2. Business scenario used in this book

    Chapter 3. IBM Worklight security overview

    Chapter 4. Integrating Worklight with enterprise security

    Chapter 5. Applying Worklight security features

    Chapter 6. Integration with IBM Security Access Manager

    Chapter 7. Integration with IBM WebSphere DataPower

    Appendix A. Additional material

     

    Others who read this also read