Showing documents 21 to 25 of 120  Previous  Next

Results per page: 5 | 10 | 20

cover image

What to Consider When Switching IBM InfoSphere Information Server to Use LDAP Authentication

Web Doc, published 18 Apr 2016

When changing IBM® InfoSphere® Information Server to authenticate with Lightweight Directory Access Protocol (LDAP), consider several aspects before making the switch. This document discusses the two types of LDAP registries, what to consider when deciding which registry is best for your company, what information is needed for the configuration, and what else can be done to optimize the configuration. This IBM Rebooks® Analytics Support Web Doc applies to IBM InfoSphere Information Server versions 9.1 through 11.5. This document is intended for systems and InfoSphere Information Server ... [more]

cover image

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security

Redbooks, published 8 Dec 2014, last updated 22 Mar 2016

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the ... [more]

cover image

Cloud Security Guidelines for IBM Power Systems
Power Systems

Redbooks, published 1 Mar 2016, last updated 9 Mar 2016

This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments. The book then looks more closely at the underlying technology and hones in on the security aspects for the following subsystems:
- IBM Hardware Management Console
- IBM PowerVM
- ... [more]

cover image

Industrial Controls Security

Redguide, published 30 Dec 2015, last updated 6 Jan 2016

As cybersecurity threats evolve, we must adapt the way to fight them. The typical countermeasures are no longer adequate, given that advanced persistent threats (APTs) are the most imminent attacks that we face today. This IBM® Redguide™ publication explains why industrial installations are an attractive target and why it is so important to protect them in a new way. To help you better understand what you might be facing, we explain how attacks work, who the potential attackers are, what they want to achieve, and how they work to achieve it. We give you insights into a world that seems like ... [more]

cover image

Streamline Management of the IBM z Systems Host Cryptographic Module Using IBM Trusted Key Entry

Point-of-View, published 12 Nov 2015

Every organization has the goal and responsibility to ensure data confidentiality, integrity, and authenticity. Cryptographic systems are extensively used to provide the security needed for data transport. Cryptographic systems use keys to lock and unlock the encrypted data. The security and management of these keys is critical to the cryptographic system’s viability. For IBM® z Systems™, the Host Cryptographic Module keys are the most important keys that you have. Many standards require that the key parts for master keys never be in the clear outside of a Hardware Security Module (HSM). ... [more]

 Previous  Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.

Follow IBM Redbooks

Follow IBM Redbooks