Showing documents 1 to 10 of 147  Next

Results per page: 5 | 10 | 20


cover image

IBM Spectrum Scale Security
Security

Redpaper, published 25 Jan 2017

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental ... [more]


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


cover image

IBM BigInsights Security Implementation Part 2: Securing the IBM BigInsights Cluster Perimeter
Analytics

Web Doc, published 9 Dec 2016

Big data analytics is network intensive because it runs on a cluster of nodes. Due to the high volumes of data exchanged between nodes in the IBM® BigInsights® cluster, network isolation is vital for the following reasons:
- To prevent sniffing attacks
- To reduce the network congestion so that the corporate network is not affected by the big data cluster traffic
Isolating the cluster network also gives administrators greater flexibility in enforcing the cluster access. This IBM® Redbooks® Analytics Support web doc serves as a guide for system implementers who are ... [more]


cover image

IBM BigInsights BigIntegrate and BigQuality: IBM InfoSphere Information Server on Hadoop Deployment and Configuration Guide
Analytics

Web Doc, published 29 Apr 2016, last updated 6 Dec 2016

IBM® BigInsights® BigIntegrate and BigQuality allow for IBM InfoSphere® Information Server to be deployed on Apache Hadoop, leveraging resources in the Hadoop cluster through the Hadoop resource manager known as Yet Another Resource Negotiator (YARN). This offering introduces data locality, allowing for logic in existing and new IBM InfoSphere DataStage® jobs to run on the Hadoop data nodes where the Hadoop Distributed File System (HDFS) blocks exist. This IBM Redbooks® Analytics Support Web Doc is intended to jumpstart deployment and configuration of the IBM BigInsights BigIntegrate and ... [more]


cover image

Maximizing Performance of IBM DB2 Backups
Analytics

Web Doc, published 21 Oct 2016

This IBM® Redbooks® Analytics Support Web Doc describes how to maximize the performance of IBM DB2® backups. Backing up a database is a critical part of any disaster recovery plan. Making sure that the backup completes in a reasonable time frame means that there is always a valid backup available in case of emergency. This document describes the following elements that are critical to good backup performance:
- The backup process model
- Basic backup performance concepts
- Backup performance considerations
- Monitoring backup performance with the DB2_BAR_STATS ... [more]


cover image

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE
Security

Redbooks, published 19 Oct 2016

As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud ... [more]


cover image

IBM Data Server Manager Overview and Performance Analysis
Analytics

Web Doc, published 4 Oct 2016

IBM® Data Server Manager is a web-based, integrated database management tools platform that manages IBM DB2® for Linux, UNIX, Windows, and IBM z/OS® databases. With IBM Data Server Manager, you can monitor, analyze, tune, and administer DB2 databases. This IBM Redbooks® Analytics Support web doc describes ways to do performance analysis that can be used to drill down into SQL performance to understand the underlying issues and take corrective measures to optimize the outcome. This document provides an overview of Data Server Manager and includes information that helps Data Server Manager ... [more]


cover image

Assessing Hardware Failures on IBM PureData System for Analytics N2001, N2002, and N3001
Analytics

Web Doc, published 29 Sep 2016

This IBM Analytics Support Wed Doc describes possible hardware component failures on IBM PureData System for Analytics, their effect on the system, and its criticality and consequences if multiple components fail. This document also describes the architecture of IBM PureData System for Analytics to clarify the relationships between components. It also provides guidance on replacement scenarios. This information is intended to help users correctly respond to failures and open problem management records (PMR) with an accurate level of severity. This document provides information to help you ... [more]


cover image

Changing Physical Disk Storage in IBM DB2 pureScale: A Practical Example
Analytics

Web Doc, published 22 Sep 2016, last updated 26 Sep 2016

IBM® DB2® pureScale® provides continuous availability with multiple active servers that share a common set of disk storage subsystems. DB2 pureScale includes multiple components for high availability (HA), such as IBM Tivoli® System Automation (TSA) and IBM General Parallel File System (IBM GPFS™) for clustered file systems. Like any component in an IT infrastructure, DB2 pureScale eventually might require a migration to meet the demands of upgraded hardware and software. Database administrators, operating system administrators, and system administrators working with DB2 pureScale in ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks