End to End Security with z Systems End to End Security with z Systems

End to End Security with z Systems

Publisher Description

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

GENRE
Computing & Internet
RELEASED
2015
3 April
LANGUAGE
EN
English
LENGTH
50
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
548.7
KB
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Cloud Security Cloud Security
2010
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
2024
Securing Your Cloud: IBM Security for LinuxONE Securing Your Cloud: IBM Security for LinuxONE
2019
Cybersecurity Essentials Cybersecurity Essentials
2018
Storage and Network Convergence Using FCoE and iSCSI Storage and Network Convergence Using FCoE and iSCSI
2014
Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
IBM Technical Computing Clouds IBM Technical Computing Clouds
2013
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014