Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Publisher Description

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GENRE
Computing & Internet
RELEASED
2015
25 September
LANGUAGE
EN
English
LENGTH
188
Pages
PUBLISHER
IBM Redbooks
SIZE
2
MB
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IBM SmartCloud: Becoming a Cloud Service Provider IBM SmartCloud: Becoming a Cloud Service Provider
2012
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
IBM Tivoli Storage Manager as a Data Protection Solution IBM Tivoli Storage Manager as a Data Protection Solution
2014
Combining Business Process Management and Enterprise Architecture for Better Business Outcomes Combining Business Process Management and Enterprise Architecture for Better Business Outcomes
2011
IBM SmartCloud: Building a Cloud Enabled Data Center IBM SmartCloud: Building a Cloud Enabled Data Center
2013
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking Microsoft System Center Deploying Hyper-V with Software-Defined Storage & Networking
2015
Computer Networks Computer Networks
2015
Computer Networking Computer Networking
2018