Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Publisher Description

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GENRE
Computing & Internet
RELEASED
2015
25 September
LANGUAGE
EN
English
LENGTH
188
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
2
MB
Cybersecurity Essentials Cybersecurity Essentials
2018
Microsoft Windows Networking Essentials Microsoft Windows Networking Essentials
2011
CCNA Certification All-in-One For Dummies CCNA Certification All-in-One For Dummies
2010
Security Vs. Convenience Security Vs. Convenience
2012
The TCP/IP Guide The TCP/IP Guide
2005
A Practical Approach to Cloud IaaS with IBM SoftLayer A Practical Approach to Cloud IaaS with IBM SoftLayer
2016
Storage and Network Convergence Using FCoE and iSCSI Storage and Network Convergence Using FCoE and iSCSI
2014
Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
IBM Technical Computing Clouds IBM Technical Computing Clouds
2013
IBM and Cisco: Together for a World Class Data Center IBM and Cisco: Together for a World Class Data Center
2013
Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
2014
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Computer Networks Computer Networks
2015
Computer Networking Computer Networking
2018
Learning Networking Learning Networking
2012