Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Beschreibung des Verlags

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GENRE
Computer und Internet
ERSCHIENEN
2015
25. September
SPRACHE
EN
Englisch
UMFANG
188
Seiten
VERLAG
IBM Redbooks
GRÖSSE
2
 MB
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IBM PowerHA SystemMirror for AIX Cookbook IBM PowerHA SystemMirror for AIX Cookbook
2015
Liberty in a DevOps Continuous Delivery Environment Liberty in a DevOps Continuous Delivery Environment
2015
IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile
2015
IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation
2015
Systems of Insight Overview Systems of Insight Overview
2015
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
Software-Defined Networking for Transport Networks Software-Defined Networking for Transport Networks
2014
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012
Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking
2015
Computer and Information Sciences Computer and Information Sciences
2016