Pollack, Andrew: BP102 Best Practices for Creating a Secure IBM Lotus Domino Infrastructure

Do you use the same agent signing ID for the most trivial applications as for your most critical ones? Knowing how to do something is only half the battle. Knowing when to do it just as important. True security is about more than ACLs, Reader Names, and Encryption. It's about defining the standards...

THEMES: Lotus\...\Presentations ... | Pollack, Andrew
YEAR: 2008
Login Login
User: Anonymous


HIDEWHEN: GCC-MediumAccess
LABEL: Lotusphere
ORGANIZATIONS: IBM
PEOPLE: Pollack, Andrew
PLACES: Orlando
TIME: 2008
 

Comments/attachments: Close
 
Best Practices for Creating a Secure IBM Lotus Domino Infrastructure
Andrew Pollack / 22.01.2008 19:30:00

Do you use the same agent signing ID for the most trivial applications as for your most critical ones? Knowing how to do something is only half the battle. Knowing when to do it just as important. True security is about more than ACLs, Reader Names, and Encryption. It's about defining the standards and practices under which your applications will be built and and your servers managed. Learn how to apply development techniques based on risk categories rather than on a negotiation between a junior developer and a business unit manager. Learn how the administrative tools in Lotus Domino can let you safely delegate management tasks without giving away the keys to the kingdom. Protect your team as well as you protect your applications. Whether you're on Lotus Domino 6.x, 7.x, or 8.x this session has something to offer you as an administrator.

https://www-926.ibm.com/events/lotus/lsph2008.nsf/sessionabstract?openform&sessionid=BP102

Please log in to access full content/presentation