Introduction to the New Mainframe: Security

Download Introduction to the New Mainframe: Security PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738489646
Total Pages : 550 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Introduction to the New Mainframe: Security by : Rica Weller

Download or read book Introduction to the New Mainframe: Security written by Rica Weller and published by IBM Redbooks. This book was released on 2007-04-26 with total page 550 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.

Introduction to the New Mainframe

Download Introduction to the New Mainframe PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 0 pages
Book Rating : 4.:/5 (288 download)

DOWNLOAD NOW!


Book Synopsis Introduction to the New Mainframe by :

Download or read book Introduction to the New Mainframe written by and published by . This book was released on 2007 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Introduction to the New Mainframe

Download Introduction to the New Mainframe PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 446 pages
Book Rating : 4.:/5 (133 download)

DOWNLOAD NOW!


Book Synopsis Introduction to the New Mainframe by : Mike Ebbers

Download or read book Introduction to the New Mainframe written by Mike Ebbers and published by . This book was released on 2016 with total page 446 pages. Available in PDF, EPUB and Kindle. Book excerpt: Based on the full-text book produced by the International Technical Support Organization (ITSO), this IBM Redbook publication provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. --

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

Download IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738435880
Total Pages : 494 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite by : Axel Buecker

Download or read book IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite written by Axel Buecker and published by IBM Redbooks. This book was released on 2011-08-18 with total page 494 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Introduction to the New Mainframe: IBM z/VSE Basics

Download Introduction to the New Mainframe: IBM z/VSE Basics PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738441406
Total Pages : 446 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Introduction to the New Mainframe: IBM z/VSE Basics by : Mike Ebbers

Download or read book Introduction to the New Mainframe: IBM z/VSE Basics written by Mike Ebbers and published by IBM Redbooks. This book was released on 2016-03-02 with total page 446 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication is based on the book Introduction to the New Mainframe: z/OS Basics, SG24-6366, which was produced by the International Technical Support Organization (ITSO), Poughkeepsie Center. It provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics, or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation. It is also not a reference book that discusses every feature and option of the mainframe facilities. Others who can benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course, and can include topics not covered in this textbook. In this course, we use simplified examples and focus mainly on basic system functions. Hands-on exercises are provided throughout the course to help students explore the mainframe style of computing. At the end of this course, you will be familiar with the following information: Basic concepts of the mainframe, including its usage and architecture Fundamentals of IBM z/VSE® (VSE), an IBM zTM Systems entry mainframe operating system (OS) An understanding of mainframe workloads and the major middleware applications in use on mainframes today The basis for subsequent course work in more advanced, specialized areas of z/VSE, such as system administration or application programming

Introduction to the New Mainframe: z/VM Basics

Download Introduction to the New Mainframe: z/VM Basics PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738488550
Total Pages : 468 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Introduction to the New Mainframe: z/VM Basics by : Lydia Parziale

Download or read book Introduction to the New Mainframe: z/VM Basics written by Lydia Parziale and published by IBM Redbooks. This book was released on 2008-01-10 with total page 468 pages. Available in PDF, EPUB and Kindle. Book excerpt: This textbook provides students with the background knowledge and skills necessary to begin using the basic functions and features of z/VM Version 5, Release 3. It is part of a series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to be literate in personal computing and have some computer science or information systems background. Others who will benefit from this textbook include z/OS professionals who would like to expand their knowledge of other aspects of the mainframe computing environment. This course can be used as a prerequisite to understanding Linux on System z. After reading this textbook and working through the exercises, the student will have received a basic understanding of the following topics: The Series z Hardware concept and the history of the mainframe Virtualization technology in general and how it is exploited by z/VM Operating systems that can run as guest systems under z/VM z/VM components The z/VM control program and commands The interactive environment under z/VM, CMS and its commands z/VM planning and administration Implementing the networking capabilities of z/VM Tools to monitor the performance of z/VM systems and guest operating systems The REXX programming language and CMS pipelines Security issues when running z/VM

Security Functions of IBM DB2 10 for z/OS

Download Security Functions of IBM DB2 10 for z/OS PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738436038
Total Pages : 456 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security Functions of IBM DB2 10 for z/OS by : Paolo Bruni

Download or read book Security Functions of IBM DB2 10 for z/OS written by Paolo Bruni and published by IBM Redbooks. This book was released on 2011-09-14 with total page 456 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.

Mainframe Basics for Security Professionals

Download Mainframe Basics for Security Professionals PDF Online Free

Author :
Publisher : Pearson Education
ISBN 13 : 013270434X
Total Pages : 194 pages
Book Rating : 4.1/5 (327 download)

DOWNLOAD NOW!


Book Synopsis Mainframe Basics for Security Professionals by : Ori Pomerantz

Download or read book Mainframe Basics for Security Professionals written by Ori Pomerantz and published by Pearson Education. This book was released on 2007-12-28 with total page 194 pages. Available in PDF, EPUB and Kindle. Book excerpt: Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Download Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738441023
Total Pages : 192 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security by : Axel Buecker

Download or read book Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-11-02 with total page 192 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Download Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738440949
Total Pages : 188 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security by : Axel Buecker

Download or read book Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2015-09-25 with total page 188 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

What On Earth is a Mainframe?

Download What On Earth is a Mainframe? PDF Online Free

Author :
Publisher : Lulu.com
ISBN 13 : 1409225356
Total Pages : 210 pages
Book Rating : 4.4/5 (92 download)

DOWNLOAD NOW!


Book Synopsis What On Earth is a Mainframe? by : David Stephens

Download or read book What On Earth is a Mainframe? written by David Stephens and published by Lulu.com. This book was released on 2008-10-08 with total page 210 pages. Available in PDF, EPUB and Kindle. Book excerpt: Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.

Security on IBM z/VSE

Download Security on IBM z/VSE PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738456918
Total Pages : 440 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security on IBM z/VSE by : Helmut Hellner

Download or read book Security on IBM z/VSE written by Helmut Hellner and published by IBM Redbooks. This book was released on 2018-06-14 with total page 440 pages. Available in PDF, EPUB and Kindle. Book excerpt: One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

Getting Started with z/OS Data Set Encryption

Download Getting Started with z/OS Data Set Encryption PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738460222
Total Pages : 274 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Getting Started with z/OS Data Set Encryption by : Bill White

Download or read book Getting Started with z/OS Data Set Encryption written by Bill White and published by IBM Redbooks. This book was released on 2021-12-10 with total page 274 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Mainframe from Scratch: Hardware Configuration and z/OS Build

Download Mainframe from Scratch: Hardware Configuration and z/OS Build PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738441619
Total Pages : 240 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Mainframe from Scratch: Hardware Configuration and z/OS Build by : Keith Winnard

Download or read book Mainframe from Scratch: Hardware Configuration and z/OS Build written by Keith Winnard and published by IBM Redbooks. This book was released on 2016-12-22 with total page 240 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you install, customize, and configure an IBM z13® and build z/OS® environments. This book is intended for those readers who are new to the platform and are faced with the task of installing a mainframe for the first time. By the term mainframe in this instance, we refer to the hardware and the system software. The intention is to show you how this installation can be done. Volume 1 shows you how we set up a mainframe and installed z/OS V2R2 and IBM DB2® V11. The starting point is a basic hardware configuration of an IBM z13 and DS8000® as shipped from the factory. Volume 1 shows you how the following milestones were achieved: Creating a configuration for the Customized Offering Driver (COD) system Stand-alone restoration of the COD Expanding the configuration Installing the z/OS V2R2 ServerPac Loading and running IVPs for z/OS ServerPac Installing DB2 ServerPac and IVPs This publication includes figures that show you how the initial builds were achieved. For this book, we designed a scenario and show you how to build that scenario step-by-step. Although your requirements likely differ from our scenario, we intend to provide you with an example to show you how it can be done and samples and downloadable materials that you can choose to modify to bring you closer to meeting your needs. This book is divided into the following parts: Part 1: Overview and Planning In this part, we introduce you to how we approached the project. Part 2: Configuration and builds In this part, we describe the tasks that must be completed to create the initial build for the scenario that is described in Part 1.

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security

Download Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738440108
Total Pages : 324 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security by : Axel Buecker

Download or read book Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security written by Axel Buecker and published by IBM Redbooks. This book was released on 2016-03-22 with total page 324 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Four Ways to Transform Your Mainframe for a Hybrid Cloud World

Download Four Ways to Transform Your Mainframe for a Hybrid Cloud World PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738459763
Total Pages : 30 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Four Ways to Transform Your Mainframe for a Hybrid Cloud World by : Guillaume Arnould

Download or read book Four Ways to Transform Your Mainframe for a Hybrid Cloud World written by Guillaume Arnould and published by IBM Redbooks. This book was released on 2021-06-04 with total page 30 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® mainframe remains a widely used enterprise computing workhorse, hosting essential IT for the majority of the world's top banks, airlines, insurers and more. As the mainframe continues to evolve, the newest IBM Z® servers offer solutions for AI and analytics, blockchain, cloud, DevOps, security and resiliency, with the aim of making the client experience similar to that of using cloud services. Many organizations today face challenges with their core IT infrastructure: Complexity and stability An environment might have years of history and be seen as too complex to maintain or update. Problems with system stability can impact operations and be considered a high risk for the business. Workforce challenges Many data center teams are anticipating a skills shortage within the next 5 years due to a retiring and declining workforce specialized in the mainframe, not to mention the difficulty of attracting new talent. Total cost of ownership Some infrastructure solutions are seen as too expensive, and it's not always easy to balance up-front costs with the life expectancy and benefits of a given platform. Lack of speed and agility Older applications can be seen as too slow and monolithic as organizations face an increasing need for faster turnaround and release cycles. Some software vendors suggest addressing these challenges with the "big bang" approach of moving your entire environment to a public cloud. But public cloud isn't the best option for every workload, and a hybrid multicloud approach can offer the best of both worlds. IBM Z is constantly being developed to address the real challenges businesses face today, and every day we're helping clients modernize their IT environments. There are 4 strategic elements to consider when modernizing your mainframe environment: Infrastructure Applications Data access DevOps chain This paper focuses on these four modernization dimensions.

Security on z/VM

Download Security on z/VM PDF Online Free

Author :
Publisher : IBM Redbooks
ISBN 13 : 0738488542
Total Pages : 348 pages
Book Rating : 4.7/5 (384 download)

DOWNLOAD NOW!


Book Synopsis Security on z/VM by : Paola Bari

Download or read book Security on z/VM written by Paola Bari and published by IBM Redbooks. This book was released on 2007-12-05 with total page 348 pages. Available in PDF, EPUB and Kindle. Book excerpt: Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conference calls in many organizations throughout the world. And many organizations are starting to turn toward System zTM and z/VM® after such discussions. The virtual machine operating system has over 40 years of experience as a hosting platform for servers, from the days of VM/SP, VM/XA, VM/ESA® and especially now with z/VM. With the consolidation of servers and conservative estimates that approximately seventy percent of all critical corporate data reside on System z, we find ourselves needing a highly secure environment for the support of this infrastructure. This document was written to assist z/VM support and security personnel in providing the enterprise with a safe, secure and manageable environment. This IBM® Redbooks® publication provides an overview of security and integrity provided by z/VM and the processes for the implementation and configuration of z/VM Security Server, z/VM LDAP Server, IBM Tivoli® Directory Server for z/OS®, and Linux® on System z with PAM for LDAP authentication. Sample scenarios with RACF® database sharing between z/VM and z/OS, or through Tivoli Directory Integrator to synchronize LDAP databases, are also discussed in this book. This book provides information about configuration and usage of Linux on System z with the System z Cryptographic features documenting their hardware and software configuration. The Consul zSecure Pro Suite is also part of this document: this product helps to control and audit security not only on one system, but can be used as a single point of enterprise wide security control. This document covers the installation and configuration of this product and detailed information is presented on how z/Consul can be used to collect and analyze z/VM security data and how it can be helpful in the administration of your audit data.