IBM XIV Security with Data-at-Rest Encryption IBM XIV Security with Data-at-Rest Encryption

IBM XIV Security with Data-at-Rest Encryption

Descripción editorial

With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business.

Encrypting "data at rest" is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. As with all of its features, the IBM® XIV® Storage System provides data-at-rest encryption at no charge. This gives clients the opportunity to take advantage of encryption and still enjoy the lower total cost of ownership that XIV offers.

This IBM Redpaper™ publication explains the architecture and design of the XIV encryption solution and how it must be configured and implemented. It can help clients and Storage Administrators who want to enable data encryption on XIV storage systems.

GÉNERO
Informática e Internet
PUBLICADO
2014
11 de agosto
IDIOMA
EN
Inglés
EXTENSIÓN
74
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
2
MB

Más libros de IBM Redbooks

IBM Business Process Manager V8.5 Performance Tuning and Best Practices IBM Business Process Manager V8.5 Performance Tuning and Best Practices
2015
Business Process Management Design Guide: Using IBM Business Process Manager Business Process Management Design Guide: Using IBM Business Process Manager
2015
A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server
2015
IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation
2015
Using Liberty for DevOps, Continuous Delivery, and Deployment Using Liberty for DevOps, Continuous Delivery, and Deployment
2015
Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer
2015