End to End Security with z Systems End to End Security with z Systems

End to End Security with z Systems

Descripción editorial

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

GÉNERO
Informática e Internet
PUBLICADO
2015
3 de abril
IDIOMA
EN
Inglés
EXTENSIÓN
50
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
548.7
KB

Más libros de IBM Redbooks

Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
IBM Watson Content Analytics: Discovering Actionable Insight from Your Content IBM Watson Content Analytics: Discovering Actionable Insight from Your Content
2014
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Taking Advantage of SAP Banking Solutions in an IBM zEnterprise Multiplatform Environment Taking Advantage of SAP Banking Solutions in an IBM zEnterprise Multiplatform Environment
2015
IBM Flex System V7000 Storage Node Introduction and Implementation Guide IBM Flex System V7000 Storage Node Introduction and Implementation Guide
2014
IBM MobileFirst Strategy Software Approach IBM MobileFirst Strategy Software Approach
2014