22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

just-in-time learning and helps streamline training programs and training<br />

requirements. It allows customers to manage their entire training program,<br />

both physical classroom and e-learning based, from a single platform.<br />

The whole Lotus Workplace architecture is best summarized in Figure 12-4,<br />

which shows all of the elements of the architecture.<br />

Figure 12-4 Lotus Workplace architecture<br />

Securing the Workplace architecture implies applying the security of the<br />

elements discussed in other sections of this redbook. Thus, securing this<br />

environment requires only that the security approach, methods, and<br />

recommendations outlined in the previous and subsequent sections of this book<br />

be applied.<br />

For Workplace Messaging, the security principles, methodologies, and<br />

recommendations for Notes/Domino messaging as well as iNotes Web Access<br />

should be applied, including the WebSphere portal recommendations, which<br />

follow.<br />

For Workplace Team Collaboration, the security principles, methodologies, and<br />

recommendations for QuickPlace and Sametime should be applied, including the<br />

WebSphere portal recommendations which follow.<br />

Chapter 12. Security features of other Lotus products 557

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!