Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Descripción editorial

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GÉNERO
Informática e Internet
PUBLICADO
2015
2 de noviembre
IDIOMA
EN
Inglés
EXTENSIÓN
192
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
1.7
MB
IBM WebSphere Application Server Liberty Profile Guide for Developers IBM WebSphere Application Server Liberty Profile Guide for Developers
2015
IBM DS8870 Copy Services for Open Systems IBM DS8870 Copy Services for Open Systems
2015
Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2 Implementing High Availability and Disaster Recovery in IBM PureApplication Systems V2
2015
Guide to IBM PowerHA SystemMirror for AIX Version 7.1.3 Guide to IBM PowerHA SystemMirror for AIX Version 7.1.3
2015
IBM Tivoli Storage Manager as a Data Protection Solution IBM Tivoli Storage Manager as a Data Protection Solution
2014
Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer Enhance Inbound and Outbound Marketing with a Trusted Single View of the Customer
2015
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Apple Watch User Guide Apple Watch User Guide
2020