Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Beschreibung des Verlags

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery.

The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations.

This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.

GENRE
Computer und Internet
ERSCHIENEN
2014
12. Oktober
SPRACHE
EN
Englisch
UMFANG
386
Seiten
VERLAG
IBM Redbooks
GRÖSSE
5,8
 MB

Mehr ähnliche Bücher

IBM System Storage Data Encryption IBM System Storage Data Encryption
2010
System z Crypto and TKE Update System z Crypto and TKE Update
2011
Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
2012
Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch
2012
A Practical Guide to TPM 2.0 A Practical Guide to TPM 2.0
2015
Windows 7 Desktop Support and Administration Windows 7 Desktop Support and Administration
2010

Mehr Bücher von IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Introduction to the New Mainframe: z/OS Basics Introduction to the New Mainframe: z/OS Basics
2011

Kund:innen kauften auch

IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers
2019
Keynote User Guide for Mac Keynote User Guide for Mac
2023
Numbers User Guide for Mac Numbers User Guide for Mac
2023
MacBook Air Essentials MacBook Air Essentials
2018