Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Publisher Description

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GENRE
Computers & Internet
RELEASED
2015
November 2
LANGUAGE
EN
English
LENGTH
192
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
1.7
MB
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Cloud Security Guidelines for IBM Power Systems Cloud Security Guidelines for IBM Power Systems
2016
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Cybersecurity Essentials Cybersecurity Essentials
2018
ABCs of IBM z/OS System Programming Volume 1 ABCs of IBM z/OS System Programming Volume 1
2018
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
2008
IBM Watson Content Analytics: Discovering Actionable Insight from Your Content IBM Watson Content Analytics: Discovering Actionable Insight from Your Content
2014
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
Experiences with Oracle Database 12c Release 1 on Linux on System z Experiences with Oracle Database 12c Release 1 on Linux on System z
2014
Oracle to DB2 Conversion Guide: Compatibility Made Easy Oracle to DB2 Conversion Guide: Compatibility Made Easy
2014
IBM SAN Solution Design Best Practices for VMware vSphere ESXi IBM SAN Solution Design Best Practices for VMware vSphere ESXi
2013
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Apple Watch User Guide Apple Watch User Guide
2020