IBM System Storage Open Systems Tape Encryption Solutions IBM System Storage Open Systems Tape Encryption Solutions

IBM System Storage Open Systems Tape Encryption Solutions

Publisher Description

This IBM® Redbooks® publication discusses IBM System Storage Open Systems Tape Encryption solutions. It specifically describes Tivoli Key Lifecycle Manager (TKLM) Version 2, which is a Java software program that manages keys enterprise-wide and provides encryption-enabled tape drives with keys for encryption and decryption.

The book explains various methods of managing IBM tape encryption. These methods differ in where the encryption policies reside, where key management is performed, whether a key manager is required, and if required, how the tape drives communicate with it.

The security and accessibility characteristics of encrypted data create considerations for clients which do not exist with storage devices that do not encrypt data. Encryption key material must be kept secure from disclosure or use by any agent that does not have authority to it; at the same time it must be accessible to any agent that has both the authority and need to use it at the time of need.

This book is written for readers who need to understand and use the various methods of managing IBM tape encryption.

GENRE
Computing & Internet
RELEASED
2010
8 December
LANGUAGE
EN
English
LENGTH
232
Pages
PUBLISHER
IBM Redbooks
SIZE
5.9
MB

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011