Showing documents 1 to 20 of 147  Next

Results per page: 5 | 10 | 20


cover image

IBM Spectrum Scale Security
Security

Redpaper, published 25 Jan 2017

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental ... [more]


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


cover image

IBM BigInsights Security Implementation Part 2: Securing the IBM BigInsights Cluster Perimeter
Analytics

Web Doc, published 9 Dec 2016

Big data analytics is network intensive because it runs on a cluster of nodes. Due to the high volumes of data exchanged between nodes in the IBM® BigInsights® cluster, network isolation is vital for the following reasons:
- To prevent sniffing attacks
- To reduce the network congestion so that the corporate network is not affected by the big data cluster traffic
Isolating the cluster network also gives administrators greater flexibility in enforcing the cluster access. This IBM® Redbooks® Analytics Support web doc serves as a guide for system implementers who are ... [more]


cover image

IBM BigInsights BigIntegrate and BigQuality: IBM InfoSphere Information Server on Hadoop Deployment and Configuration Guide
Analytics

Web Doc, published 29 Apr 2016, last updated 6 Dec 2016

IBM® BigInsights® BigIntegrate and BigQuality allow for IBM InfoSphere® Information Server to be deployed on Apache Hadoop, leveraging resources in the Hadoop cluster through the Hadoop resource manager known as Yet Another Resource Negotiator (YARN). This offering introduces data locality, allowing for logic in existing and new IBM InfoSphere DataStage® jobs to run on the Hadoop data nodes where the Hadoop Distributed File System (HDFS) blocks exist. This IBM Redbooks® Analytics Support Web Doc is intended to jumpstart deployment and configuration of the IBM BigInsights BigIntegrate and ... [more]


cover image

Maximizing Performance of IBM DB2 Backups
Analytics

Web Doc, published 21 Oct 2016

This IBM® Redbooks® Analytics Support Web Doc describes how to maximize the performance of IBM DB2® backups. Backing up a database is a critical part of any disaster recovery plan. Making sure that the backup completes in a reasonable time frame means that there is always a valid backup available in case of emergency. This document describes the following elements that are critical to good backup performance:
- The backup process model
- Basic backup performance concepts
- Backup performance considerations
- Monitoring backup performance with the DB2_BAR_STATS ... [more]


cover image

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE
Security

Redbooks, published 19 Oct 2016

As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud ... [more]


cover image

IBM Data Server Manager Overview and Performance Analysis
Analytics

Web Doc, published 4 Oct 2016

IBM® Data Server Manager is a web-based, integrated database management tools platform that manages IBM DB2® for Linux, UNIX, Windows, and IBM z/OS® databases. With IBM Data Server Manager, you can monitor, analyze, tune, and administer DB2 databases. This IBM Redbooks® Analytics Support web doc describes ways to do performance analysis that can be used to drill down into SQL performance to understand the underlying issues and take corrective measures to optimize the outcome. This document provides an overview of Data Server Manager and includes information that helps Data Server Manager ... [more]


cover image

Assessing Hardware Failures on IBM PureData System for Analytics N2001, N2002, and N3001
Analytics

Web Doc, published 29 Sep 2016

This IBM Analytics Support Wed Doc describes possible hardware component failures on IBM PureData System for Analytics, their effect on the system, and its criticality and consequences if multiple components fail. This document also describes the architecture of IBM PureData System for Analytics to clarify the relationships between components. It also provides guidance on replacement scenarios. This information is intended to help users correctly respond to failures and open problem management records (PMR) with an accurate level of severity. This document provides information to help you ... [more]


cover image

Changing Physical Disk Storage in IBM DB2 pureScale: A Practical Example
Analytics

Web Doc, published 22 Sep 2016, last updated 26 Sep 2016

IBM® DB2® pureScale® provides continuous availability with multiple active servers that share a common set of disk storage subsystems. DB2 pureScale includes multiple components for high availability (HA), such as IBM Tivoli® System Automation (TSA) and IBM General Parallel File System (IBM GPFS™) for clustered file systems. Like any component in an IT infrastructure, DB2 pureScale eventually might require a migration to meet the demands of upgraded hardware and software. Database administrators, operating system administrators, and system administrators working with DB2 pureScale in ... [more]


cover image

Managing Digital Certificates across the Enterprise
z Systems

Redbooks, published 11 Feb 2016, last updated 22 Sep 2016

This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital certificates overview” on page 1 provides an overview of digital certificates. It describes their purpose, gives a high-level overview of how they are created and their relationship to keys and encryption, and ... [more]


cover image

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture
Analytics

Web Doc, published 25 Aug 2016

Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM® BigInsights® platform processes large amounts of data by breaking the computation into smaller tasks that can be distributed onto several nodes. As this platform is shared by users in different roles (developers, analysts, data scientists, and testers), it introduces the challenge of provisioning access and authorization to the cluster and securing the data. Big data platforms are an amalgamation of several individual components that are still evolving, and are based on the ... [more]


cover image

IBM PureData System for Analytics: Improving Query Performance by Tuning Netezza Optimizer Through Postgres Configuration

Web Doc, published 23 Jun 2016

The IBM® PureData® System for Analytics, powered by Netezza® technology (“IBM Netezza”), is a data warehouse appliance that features a purpose-built analytics engine. Netezza generates a query plan for all queries that run on the system. The query plan describes the optimal execution query path as determined by the query optimizer component, which relies on statistics that are available about the database objects that are involved in the query. The Netezza query optimizer is a cost-based optimizer; that is, it determines the cost for the various execution alternatives and chooses the path ... [more]


cover image

What to Consider When Switching IBM InfoSphere Information Server to Use LDAP Authentication
Analytics

Web Doc, published 18 Apr 2016

When changing IBM® InfoSphere® Information Server to authenticate with Lightweight Directory Access Protocol (LDAP), consider several aspects before making the switch. This document discusses the two types of LDAP registries, what to consider when deciding which registry is best for your company, what information is needed for the configuration, and what else can be done to optimize the configuration. This IBM Rebooks® Analytics Support Web Doc applies to IBM InfoSphere Information Server versions 9.1 through 11.5. This document is intended for systems and InfoSphere Information Server ... [more]


cover image

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
z Systems

Redbooks, published 8 Dec 2014, last updated 22 Mar 2016

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the ... [more]


cover image

Cloud Security Guidelines for IBM Power Systems
Power Systems

Redbooks, published 1 Mar 2016, last updated 9 Mar 2016

This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments. The book then looks more closely at the underlying technology and hones in on the security aspects for the following subsystems:
- IBM Hardware Management Console
- IBM PowerVM
- ... [more]


cover image

Industrial Controls Security
Security

Redguide, published 30 Dec 2015, last updated 6 Jan 2016

As cybersecurity threats evolve, we must adapt the way to fight them. The typical countermeasures are no longer adequate, given that advanced persistent threats (APTs) are the most imminent attacks that we face today. This IBM® Redguide™ publication explains why industrial installations are an attractive target and why it is so important to protect them in a new way. To help you better understand what you might be facing, we explain how attacks work, who the potential attackers are, what they want to achieve, and how they work to achieve it. We give you insights into a world that seems like ... [more]


cover image

Streamline Management of the IBM z Systems Host Cryptographic Module Using IBM Trusted Key Entry
z Systems

Point-of-View, published 12 Nov 2015

Every organization has the goal and responsibility to ensure data confidentiality, integrity, and authenticity. Cryptographic systems are extensively used to provide the security needed for data transport. Cryptographic systems use keys to lock and unlock the encrypted data. The security and management of these keys is critical to the cryptographic system’s viability. For IBM® z Systems™, the Host Cryptographic Module keys are the most important keys that you have. Many standards require that the key parts for master keys never be in the clear outside of a Hardware Security Module (HSM). ... [more]


cover image

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
z Systems

Redbooks, published 2 Nov 2015

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a ... [more]


cover image

IBM Security Access Manager Appliance Deployment Patterns
Security

Redpaper, published 23 Oct 2015, last updated 2 Nov 2015

IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on several popular hypervisors. The integrated appliance form factor enables easier and more flexible deployment and maintenance. This IBM Redpaper™ publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks