Security on IBM z/VSE Security on IBM z/VSE

Security on IBM z/VSE

Publisher Description

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent—they could have been using resources without the business even being aware that they are there.

This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment.

This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

GENRE
Computing & Internet
RELEASED
2011
19 November
LANGUAGE
EN
English
LENGTH
460
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
12.5
MB
Security for Linux on System z Security for Linux on System z
2013
System z Crypto and TKE Update System z Crypto and TKE Update
2011
Security on z/VM Security on z/VM
2007
IBM System Storage Data Encryption IBM System Storage Data Encryption
2010
Synchronizing IBM RACF Data by using IBM Tivoli Directory Integrator Synchronizing IBM RACF Data by using IBM Tivoli Directory Integrator
2016
Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch
2012
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009
IBM Cognos Business Intelligence V10.1 Handbook IBM Cognos Business Intelligence V10.1 Handbook
2010