End to End Security with z Systems End to End Security with z Systems

End to End Security with z Systems

Publisher Description

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

GENRE
Computers & Internet
RELEASED
2015
April 3
LANGUAGE
EN
English
LENGTH
50
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
548.7
KB
Introduction to the New Mainframe: Security Introduction to the New Mainframe: Security
2007
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
2021
Cloud Security Cloud Security
2010
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009