IBM XIV Security with Data-at-Rest Encryption

Download IBM XIV Security with Data-at-Rest Encryption PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738453552
Total Pages : 74 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM XIV Security with Data-at-Rest Encryption by : Bert Dufrasne

Download or read book IBM XIV Security with Data-at-Rest Encryption written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2014-08-11 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting "data at rest" is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. As with all of its features, the IBM® XIV® Storage System provides data-at-rest encryption at no charge. This gives clients the opportunity to take advantage of encryption and still enjoy the lower total cost of ownership that XIV offers. This IBM RedpaperTM publication explains the architecture and design of the XIV encryption solution and how it must be configured and implemented. It can help clients and Storage Administrators who want to enable data encryption on XIV storage systems.

Data-at-rest Encryption for the IBM Spectrum Accelerate Family

Download Data-at-rest Encryption for the IBM Spectrum Accelerate Family PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (112 download)

DOWNLOAD NOW!


Book Synopsis Data-at-rest Encryption for the IBM Spectrum Accelerate Family by : Bertrand Dufrasne

Download or read book Data-at-rest Encryption for the IBM Spectrum Accelerate Family written by Bertrand Dufrasne and published by . This book was released on 2019 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Data-at-rest Encryption for the IBM Spectrum Accelerate Family

Download Data-at-rest Encryption for the IBM Spectrum Accelerate Family PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457574
Total Pages : 130 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Data-at-rest Encryption for the IBM Spectrum Accelerate Family by : Bert Dufrasne

Download or read book Data-at-rest Encryption for the IBM Spectrum Accelerate Family written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2019-04-05 with total page 130 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting data-at-rest is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. The IBM® Spectrum Accelerate family, which includes IBM XIV® Storage System, IBM FlashSystem® A9000, IBM FlashSystem A9000R system(s), and IBM SpectrumTM Accelerate Software provides data-at-rest encryption at no charge. Clients can take advantage of encryption and still benefit from the lower total cost of ownership (TCO) that the IBM Spectrum AccelerateTM family offers. For IBM FlashSystem A9000 and A9000R, clients now have a choice between an external key manager-based implementation or a local key based encryption implementation. The local key solution offers a simplified deployment of data-at-rest encryption. This IBM RedpaperTM publication explains the architecture and design of the XIV and IBM FlashSystem A9000 and A9000R encryption solutions. Details are provided for configuring and implementing both solutions.

IBM System Storage Solutions Handbook

Download IBM System Storage Solutions Handbook PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738441740
Total Pages : 288 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM System Storage Solutions Handbook by : Ezgi Coskun

Download or read book IBM System Storage Solutions Handbook written by Ezgi Coskun and published by IBM Redbooks. This book was released on 2016-07-15 with total page 288 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth, greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM SpectrumTM family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud. This IBM Redbooks® publication provides overviews and information about the most current IBM System Storage products. It shows how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM storage products can help you store, safeguard, retrieve, and share your data. This book is intended as a reference for basic and comprehensive information about the IBM Storage products portfolio. It provides a starting point for establishing your own enterprise storage environment. This book describes the IBM Storage products as of March, 2016.

Getting Started with Linux on Z Encryption for Data At-Rest

Download Getting Started with Linux on Z Encryption for Data At-Rest PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457469
Total Pages : 120 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Getting Started with Linux on Z Encryption for Data At-Rest by : Bill White

Download or read book Getting Started with Linux on Z Encryption for Data At-Rest written by Bill White and published by IBM Redbooks. This book was released on 2019-04-08 with total page 120 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

XIV Storage System Product Guide

Download XIV Storage System Product Guide PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738454877
Total Pages : 24 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis XIV Storage System Product Guide by : Bert Dufrasne

Download or read book XIV Storage System Product Guide written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2016-01-05 with total page 24 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM XIV Storage System is a high-end flash optimized, fully scalable enterprise disk storage system that is based on a grid of standard hardware components. The architecture of the system is designed to deliver out-of-the box performance and ease of management while harnessing the high capacity and cost benefits of serial-attached SCSI (SAS) drives. The XIV Gen3 systems (and the Model 314 in particular) offer powerful real-time compression that is based on the IBM Random Access Compression Engine (RACE) technology. This IBM Redbooks Product Guide offers a brief overview of the IBM XIV Gen3 Storage System hardware and software features.

IBM XIV Storage System Architecture and Implementation

Download IBM XIV Storage System Architecture and Implementation PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738440167
Total Pages : 488 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM XIV Storage System Architecture and Implementation by : Bertrand Dufrasne

Download or read book IBM XIV Storage System Architecture and Implementation written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2017-11-03 with total page 488 pages. Available in PDF, EPUB and Kindle. Book excerpt: Not a new version - included warning for self signed X509 certificates - see section 5.2 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL). In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.

IBM System i Security: Protecting i5/OS Data with Encryption

Download IBM System i Security: Protecting i5/OS Data with Encryption PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738485373
Total Pages : 308 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM System i Security: Protecting i5/OS Data with Encryption by : Yessong Johng

Download or read book IBM System i Security: Protecting i5/OS Data with Encryption written by Yessong Johng and published by IBM Redbooks. This book was released on 2008-07-24 with total page 308 pages. Available in PDF, EPUB and Kindle. Book excerpt: Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.

IBM XIV Storage System Business Continuity Functions

Download IBM XIV Storage System Business Continuity Functions PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738440175
Total Pages : 442 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM XIV Storage System Business Continuity Functions by : Bertrand Dufrasne

Download or read book IBM XIV Storage System Business Continuity Functions written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2018-08-07 with total page 442 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM XIV® Storage System has a rich set of copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and online backup solutions. These functions allow point-in-time copies, known as snapshots and full volume copies, and also include remote copy capabilities in either synchronous or asynchronous mode. A three-site mirroring function is now available to further improve availability and disaster recovery capabilities. These functions are included in the XIV software and all their features are available at no extra charge. The various copy functions are reviewed in separate chapters, which include detailed information about usage and practical illustrations. The book also illustrates the use of IBM® Tivoli® Storage Productivity Center for Replication to manage XIV Copy Services. This IBM Redbooks® publication is intended for anyone who needs a detailed and practical understanding of the XIV copy functions.

IBM Hyper-Scale in XIV Storage

Download IBM Hyper-Scale in XIV Storage PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738453986
Total Pages : 106 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Hyper-Scale in XIV Storage by : Bertrand Dufrasne

Download or read book IBM Hyper-Scale in XIV Storage written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2014-11-24 with total page 106 pages. Available in PDF, EPUB and Kindle. Book excerpt: Organizations are struggling with an unprecedented surge in data, both user-created and machine-created. With an increasing reliance on this rapidly growing data, effective scaling of data storage represents a key challenge for all enterprises. IBM® Hyper-Scale helps you easily overcome provisioning scenarios that normally challenge traditional systems. IBM Hyper-Scale can accommodate several critical client scenarios for centralized administration, data mobility, load balancing, over-provisioning, and storage system repurposing. IBM Hyper-Scale introduces the following major concepts and technologies, with the IBM XIV® Storage System (Gen3 models): IBM Hyper-Scale Manager is a flexible, consolidated multi-system management application that builds upon the originally released Multi-System Manager with XIV Storage Software V11.2. IBM Hyper-Scale Manager is based on, and seamlessly integrated with, the XIV graphical user interface (GUI) and spans multiple XIV systems. It virtually transforms multiple systems into a single system, allowing customers to centrally manage up to 144 XIV systems. IBM Hyper-Scale Mobility was released with XIV Storage System V11.3. It is a powerful function for moving volumes between storage containers transparently, with no disruption to host applications. IBM Hyper-Scale Consistency was released with the IBM XIV Storage Software Version 11.4. It offers cross-system consistency, enabling coordinated snapshots across independent XIV systems. It helps to ensure data protection across multiple XIV systems. This IBM RedpaperTM publication provides a broad understanding of the IBM Hyper-Scale feature. This publication is intended for XIV clients and users who want a practical understanding of IBM Hyper-Scale concepts and usage. For information about the IBM Hyper-Scale concepts, refer to the IBM white paper, IBM Hyper-Scale and Its Implementation in XIV Storage: A powerful new approach to scaling storage management.

Security Guide for IBM i V6.1

Download Security Guide for IBM i V6.1 PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738432865
Total Pages : 426 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security Guide for IBM i V6.1 by : Jim Cook

Download or read book Security Guide for IBM i V6.1 written by Jim Cook and published by IBM Redbooks. This book was released on 2009-05-29 with total page 426 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z

Download IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 073845835X
Total Pages : 116 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z by : Bertrand Dufrasne

Download or read book IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2021-06-15 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.

Getting Started with Linux on Z Encryption for Data At-Rest

Download Getting Started with Linux on Z Encryption for Data At-Rest PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 100 pages
Book Rating : 4.:/5 (111 download)

DOWNLOAD NOW!


Book Synopsis Getting Started with Linux on Z Encryption for Data At-Rest by : Bill White

Download or read book Getting Started with Linux on Z Encryption for Data At-Rest written by Bill White and published by . This book was released on 2019 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

IBM Power Systems Virtualization Operation Management for SAP Applications

Download IBM Power Systems Virtualization Operation Management for SAP Applications PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738458503
Total Pages : 116 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Power Systems Virtualization Operation Management for SAP Applications by : Dino Quintero

Download or read book IBM Power Systems Virtualization Operation Management for SAP Applications written by Dino Quintero and published by IBM Redbooks. This book was released on 2020-03-03 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: Businesses are using IBM® Power Systems servers and Linux to consolidate multiple SAP workloads onto fewer systems, increasing infrastructure utilization; reliability, availability, and serviceability (RAS); and scalability, and reducing cost. This IBM Redpaper publication describes key hardware and software components of an SAP solution stack. Furthermore, this book addresses non-functional items like RAS, security, and issue handling. Practical help for planning, implementation, configuration, installation, and monitoring of a solution stack are provided. This publication addresses topics for sellers, IT architects, IT specialists, and anyone who wants to implement and manage SAP workloads on IBM Power Systems servers. Moreover, this guide provides documentation to transfer how-to skills to the technical teams, and it provides solution guidance to the sales team. This publication complements documentation that is available at IBM Knowledge Center, and it aligns with educational materials that are provided by IBM Systems.

IBM Spectrum Scale Security

Download IBM Spectrum Scale Security PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738457167
Total Pages : 116 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Spectrum Scale Security by : Felipe Knop

Download or read book IBM Spectrum Scale Security written by Felipe Knop and published by IBM Redbooks. This book was released on 2018-09-18 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance. Security for storage systems can be classified as follows: Data storage (data at rest, which includes data durability and immutability) Access to data Movement of data (data in flight) Management of data IBM® Spectrum Scale is a software-defined storage system for high performance, large-scale workloads on-premises or in the cloud. IBM SpectrumTM Scale addresses all four aspects of security by securing data at rest (protecting data at rest with snapshots, and backups and immutability features) and securing data in flight (providing secure management of data, and secure access to data by using authentication and authorization across multiple supported access protocols). These protocols include POSIX, NFS, SMB, Hadoop, and Object (REST). For automated data management, it is equipped with powerful information lifecycle management (ILM) tools that can help administer unstructured data by providing the correct security for the correct data. This IBM RedpaperTM publication details the various aspects of security in IBM Spectrum ScaleTM, including the following items: Security of data in transit Security of data at rest Authentication Authorization Hadoop security Immutability Secure administration Audit logging Security for transparent cloud tiering (TCT) Security for OpenStack drivers Unless stated otherwise, the functions that are mentioned in this paper are available in IBM Spectrum Scale V4.2.1 or later releases.

IBM Software Defined Environment

Download IBM Software Defined Environment PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738440442
Total Pages : 820 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM Software Defined Environment by : Dino Quintero

Download or read book IBM Software Defined Environment written by Dino Quintero and published by IBM Redbooks. This book was released on 2015-08-14 with total page 820 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication introduces the IBM Software Defined Environment (SDE) solution, which helps to optimize the entire computing infrastructure--compute, storage, and network resources--so that it can adapt to the type of work required. In today's environment, resources are assigned manually to workloads, but that happens automatically in a SDE. In an SDE, workloads are dynamically assigned to IT resources based on application characteristics, best-available resources, and service level policies so that they deliver continuous, dynamic optimization and reconfiguration to address infrastructure issues. Underlying all of this are policy-based compliance checks and updates in a centrally managed environment. Readers get a broad introduction to the new architecture. Think integration, automation, and optimization. Those are enablers of cloud delivery and analytics. SDE can accelerate business success by matching workloads and resources so that you have a responsive, adaptive environment. With the IBM Software Defined Environment, infrastructure is fully programmable to rapidly deploy workloads on optimal resources and to instantly respond to changing business demands. This information is intended for IBM sales representatives, IBM software architects, IBM Systems Technology Group brand specialists, distributors, resellers, and anyone who is developing or implementing SDE.

Getting Started with z/OS Data Set Encryption

Download Getting Started with z/OS Data Set Encryption PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738460222
Total Pages : 274 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Getting Started with z/OS Data Set Encryption by : Bill White

Download or read book Getting Started with z/OS Data Set Encryption written by Bill White and published by IBM Redbooks. This book was released on 2021-12-10 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.