Showing documents 21 to 40 of 149  Previous  Next

Results per page: 5 | 10 | 20


cover image

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
z Systems

Redbooks, published 2 Nov 2015

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a ... [more]


cover image

IBM Security Access Manager Appliance Deployment Patterns
Security

Redpaper, published 23 Oct 2015, last updated 2 Nov 2015

IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on several popular hypervisors. The integrated appliance form factor enables easier and more flexible deployment and maintenance. This IBM Redpaper™ publication describes the different Security Access Manager Appliance V9.0 deployment patterns and uses hands-on examples to demonstrate how to initially configure systems in those deployments. It also describes ... [more]


cover image

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security
z Systems

Redbooks, published 25 Sep 2015

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today’s business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and ... [more]


cover image

End to End Security with z Systems
z Systems Software

Redpaper, published 3 Apr 2015

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward. The audience for this paper is IT architects and those ... [more]


cover image

Securing the IBM Mainframe
z Systems

Solution Guide, published 27 Mar 2015

Cybercrime is a sophisticated activity. It is no longer a playing field for “script-kiddies” trying to get access to systems and servers for fun, and it is not about quick hacks to get in and get out quickly. It is now about real commercial, political, or even military advantages. There have been reports in the press recently of large systems data breaches, and it is apparent that some of these are associated with attempts to access mainframe data. The skills and knowledge that are required to manage and operate a sophisticated IBM System z mainframe are different from those that are used ... [more]


cover image

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager
System x

Redbooks, published 16 Mar 2015

Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed. Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent ... [more]


cover image

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
z Systems

Redbooks, published 12 Oct 2014

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the ... [more]


cover image

Simplify Software Audits and Cut Costs by Using the IBM License Metric Tool
Security

Redpaper, published 17 Sep 2014

In this IBM® Redpaper™ publication, you learn how to implement the IBM subcapacity licensing functions and the IBM License Metric Tool to track and manage licenses for your IBM WebSphere® Application Server instances. It also summarizes the different licensing models that IBM employs, the advantages of using software asset management for IT companies, and explains how to save money by using these the subcapacity model for WebSphere Application Server licenses. The primary purpose of the License Metric Tool is counting the processor value units (PVU) and resource value units (RVU) for ... [more]


cover image

IBM License Metric Tool tracks and manages licenses for WebSphere® Application Server
Security

Solution Guide, published 18 Aug 2014, last updated 3 Sep 2014

Virtually every aspect of managing an IT environment has drastically increased in complexity as new technologies and business shifts have altered the way businesses organize their IT infrastructure. As companies move to greater usage of virtualization, sub-capacity based technologies, and cloud based technologies to manage their infrastructure requirements, the licensing of that software has become increasingly difficult to track and manage. In addition, licensing models have changed to accommodate modern IT infrastructure models. This IBM® Redbooks® Solution Guide describes how IBM® ... [more]


cover image

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
Security

Redguide, published 16 Jul 2014

In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks. These applications can be used by an attacker to obtain initial access into the ... [more]


cover image

Performance Tuning for IBM Security Directory Server
Security

Redpaper, published 2 Apr 2014

In today’s highly connected world, directory servers are the IT cornerstone of many businesses. These components of the corporate infrastructure are the foundation of authentication systems for internal and, more commonly, external user populations. Managing a directory server with several hundred internal users is not all that difficult. However, managing a directory server with several million external users in all 24 time zones throughout the world is a much more daunting task. IBM® Security Directory Server software can handle millions of entries, given the right architecture, ... [more]


cover image

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Security

Redbooks, published 12 Apr 2013, last updated 6 Feb 2014

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external ... [more]


cover image

Centralized Key Management using the IBM Enterprise Key Management Foundation
z Systems

Solution Guide, published 13 Jul 2013

Looking at the pervasiveness of encryption today, you can understand the challenge an organization faces with managing the cryptography infrastructure and the encryption keys and certificates for their IT infrastructures. Financial institutions use encryption to secure payments as they face compliance requirements from the Payment Card Industry (PCI): the PCI-PIN and PCI-DSS requirements. Other organizations have to deal with the protection of personal data, for example, the public sector, insurance companies, and healthcare providers. They must comply with complex regulations, such as the ... [more]


cover image

Realizing Efficient Enterprise Security Intelligence by Using IBM Security Intelligence Solutions
Security

Redguide, published 9 May 2013

No matter how large or small an organization, the demands for security intelligence are growing. Organizations of all sizes face tremendous challenges to keep their assets secure. Most organizations use heterogeneous IT technologies and software solutions that produce a wide variety of disparate data. Such technologies and solutions include compliance and vulnerability scans, IDS/IPS alerts, asset data, access logs, and more. They monitor and track network performance, monitor and track application security, and collect and manage event logs in an attempt to meet overall IT objectives. Also, ... [more]


cover image

Security for Linux on System z: Securing Your Network
z Systems

Web Doc, published 22 Feb 2013

The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of ... [more]


cover image

Security for Linux on System z
z Systems

Redbooks, published 10 Jan 2013

No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are ... [more]


cover image

Enhancing Password Management by Adding Security, Flexibility, and Agility
Security

Solution Guide, published 7 Dec 2012

The number of logins and passwords that employees must manage on a daily basis continues to be a source of frustration and lost productivity. Employees must remember login information for numerous applications. Many of these applications require different user names and passwords, different password complexity requirements, and forced password changes in shorter intervals. The number of logins that an employee must manage grows with the deployment of each additional business application. The corporate help desk often endures the process of restoring lost or forgotten login information for an ... [more]


cover image

A Sweeping Approach to Security
z Systems

Point-of-View, published 29 Nov 2012, last updated 29 Nov 2012

Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be protected. Consequently, organizations increasingly need to implement a smarter approach that relies on fine-grained control of access privileges and far field detection of potential and seemingly unrelated threats. Such an approach must also rely on multitier containment methods to isolate intrusions and to minimize damage. To adopt a broad security approach ... [more]


cover image

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
Security

Redbooks, published 11 Sep 2012

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access Manager for ... [more]


cover image

RACF Remote Sharing Facility over TCP/IP
z Systems

Redbooks, published 30 Aug 2012

The IBM RACF® remote sharing facility (RRSF) allows RACF to communicate with other IBM z/OS® systems that use RACF, allowing you to maintain remote RACF databases. RRSF support for the security administrator provides these benefits:

  • Administration of RACF databases from anywhere in the RRSF network
  • Creation of User ID associations for password and password phrase synchronization
  • Automatic synchronization of databases
    Before to z/OS V1R13, RRSF only supported the APPC protocol. With z/OS release V1R13, TCP/IP can be used to extend the RACF Remote Sharing Facility ... [more]


  • The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



    IBM Redbooks Mobile App
    Redbooks mobile app

    The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


    Follow IBM Redbooks

    Follow IBM Redbooks