Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460222
Category : Computers
Languages : en
Pages : 274
Book Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Getting Started with z/OS Data Set Encryption
Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460222
Category : Computers
Languages : en
Pages : 274
Book Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Publisher: IBM Redbooks
ISBN: 0738460222
Category : Computers
Languages : en
Pages : 274
Book Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Getting Started with Z/OS Data Set Encryption
Author: Bill White (Telecommunications engineer)
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages :
Book Description
Getting Started: Journey to Modernization with IBM Z
Author: Makenzie Manna
Publisher: IBM Redbooks
ISBN: 0738459534
Category : Computers
Languages : en
Pages : 90
Book Description
Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.
Publisher: IBM Redbooks
ISBN: 0738459534
Category : Computers
Languages : en
Pages : 90
Book Description
Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.
Getting Started with Linux on Z Encryption for Data At-Rest
Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738457469
Category : Computers
Languages : en
Pages : 120
Book Description
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Publisher: IBM Redbooks
ISBN: 0738457469
Category : Computers
Languages : en
Pages : 120
Book Description
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Getting started with z/OS Container Extensions and Docker
Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738458155
Category : Computers
Languages : en
Pages : 270
Book Description
IBM® z/OS® Container Extensions (IBM zCX) is a new feature of the next version of the IBM z/OS Operating System (z/OS V2.4). It makes it possible to run Linux on IBM Z® applications that are packaged as Docker container images on z/OS. Application developers can develop, and data centers can operate, popular open source packages, Linux applications, IBM software, and third-party software together with z/OS applications and data. This IBM Redbooks® publication helps you to understand the concepts, business perspectives and reference architecture for installing, tailoring, and configuring zCX in your own environment.
Publisher: IBM Redbooks
ISBN: 0738458155
Category : Computers
Languages : en
Pages : 270
Book Description
IBM® z/OS® Container Extensions (IBM zCX) is a new feature of the next version of the IBM z/OS Operating System (z/OS V2.4). It makes it possible to run Linux on IBM Z® applications that are packaged as Docker container images on z/OS. Application developers can develop, and data centers can operate, popular open source packages, Linux applications, IBM software, and third-party software together with z/OS applications and data. This IBM Redbooks® publication helps you to understand the concepts, business perspectives and reference architecture for installing, tailoring, and configuring zCX in your own environment.
IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z
Author: Bertrand Dufrasne
Publisher: IBM Redbooks
ISBN: 073845835X
Category : Computers
Languages : en
Pages : 116
Book Description
This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.
Publisher: IBM Redbooks
ISBN: 073845835X
Category : Computers
Languages : en
Pages : 116
Book Description
This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.
Keeping Up With Security and Compliance on IBM Z
Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738461172
Category : Computers
Languages : en
Pages : 136
Book Description
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z® security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks® publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS® systems. This publication is for IT managers and architects, system and security administrators
Publisher: IBM Redbooks
ISBN: 0738461172
Category : Computers
Languages : en
Pages : 136
Book Description
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z® security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks® publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS® systems. This publication is for IT managers and architects, system and security administrators
IBM z/OS Management Facility V2R3
Author: Redelf Janssen
Publisher: IBM Redbooks
ISBN: 0738443093
Category : Computers
Languages : en
Pages : 614
Book Description
This IBM® Redbooks® publication helps you install, configure, and use the IBM z/OS® Management Facility (z/OSMF). z/OSMF is a product for z/OS that simplifies, optimizes, and modernizes the z/OS system programmer experience. z/OSMF delivers solutions in a task-oriented, web browser-based user interface with integrated user assistance. The goal of z/OSMF is to improve system programmer productivity, and make functions easier to understand and use. This improvement makes system programmers more productive as quickly as possible with the least amount of training. You can automate tasks, reduce the learning curve, and improve productivity through a modern, simplified, and intuitive task-based, browser-based interface. z/OSMF is aimed at a mixed skills workforce: It is suited to professionals who are new to z/OS and those who are skilled in z/OS. Each professional has their own needs and faces their own challenges. Novice system programmer might need to understand the "big picture" and how procedures are done. Novices also need access to documentation about procedures and tasks, and implement them according to the rules of the enterprise. Experienced system programmers are familiar with tasks and procedures. Therefore, the goal is to make their work less error-prone and easier. This goal allows them to be more productive and contribute more to their business. Although z/OS delivered simplification since it was introduced, z/OSMF brings a new dimension and focus to simplification. z/OSMF simplifies and modernizes the user experience and helps make pertinent information readily available and easily accessible.
Publisher: IBM Redbooks
ISBN: 0738443093
Category : Computers
Languages : en
Pages : 614
Book Description
This IBM® Redbooks® publication helps you install, configure, and use the IBM z/OS® Management Facility (z/OSMF). z/OSMF is a product for z/OS that simplifies, optimizes, and modernizes the z/OS system programmer experience. z/OSMF delivers solutions in a task-oriented, web browser-based user interface with integrated user assistance. The goal of z/OSMF is to improve system programmer productivity, and make functions easier to understand and use. This improvement makes system programmers more productive as quickly as possible with the least amount of training. You can automate tasks, reduce the learning curve, and improve productivity through a modern, simplified, and intuitive task-based, browser-based interface. z/OSMF is aimed at a mixed skills workforce: It is suited to professionals who are new to z/OS and those who are skilled in z/OS. Each professional has their own needs and faces their own challenges. Novice system programmer might need to understand the "big picture" and how procedures are done. Novices also need access to documentation about procedures and tasks, and implement them according to the rules of the enterprise. Experienced system programmers are familiar with tasks and procedures. Therefore, the goal is to make their work less error-prone and easier. This goal allows them to be more productive and contribute more to their business. Although z/OS delivered simplification since it was introduced, z/OSMF brings a new dimension and focus to simplification. z/OSMF simplifies and modernizes the user experience and helps make pertinent information readily available and easily accessible.
Transitioning to Quantum-Safe Cryptography on IBM Z
Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460680
Category : Computers
Languages : en
Pages : 208
Book Description
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Publisher: IBM Redbooks
ISBN: 0738460680
Category : Computers
Languages : en
Pages : 208
Book Description
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
ABCs of IBM z/OS System Programming Volume 1
Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738442763
Category : Computers
Languages : en
Pages : 118
Book Description
The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised.
Publisher: IBM Redbooks
ISBN: 0738442763
Category : Computers
Languages : en
Pages : 118
Book Description
The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised.