Showing documents 31 to 40 of 116  Previous  Next

Results per page: 5 | 10 | 20


cover image

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
z Systems

Redbooks, published 12 Oct 2014

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the ... [more]


cover image

Simplify Software Audits and Cut Costs by Using the IBM License Metric Tool
Security

Redpaper, published 17 Sep 2014

In this IBM® Redpaper™ publication, you learn how to implement the IBM subcapacity licensing functions and the IBM License Metric Tool to track and manage licenses for your IBM WebSphere® Application Server instances. It also summarizes the different licensing models that IBM employs, the advantages of using software asset management for IT companies, and explains how to save money by using these the subcapacity model for WebSphere Application Server licenses. The primary purpose of the License Metric Tool is counting the processor value units (PVU) and resource value units (RVU) for ... [more]


cover image

IBM License Metric Tool tracks and manages licenses for WebSphere® Application Server
Security

Solution Guide, published 18 Aug 2014, last updated 3 Sep 2014

Virtually every aspect of managing an IT environment has drastically increased in complexity as new technologies and business shifts have altered the way businesses organize their IT infrastructure. As companies move to greater usage of virtualization, sub-capacity based technologies, and cloud based technologies to manage their infrastructure requirements, the licensing of that software has become increasingly difficult to track and manage. In addition, licensing models have changed to accommodate modern IT infrastructure models. This IBM® Redbooks® Solution Guide describes how IBM® ... [more]


cover image

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
Security

Redguide, published 16 Jul 2014

In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), web-based email, cloud data storage, and many others are all readily available. The ease and speed at which these new applications can be installed or simply accessed reduces the effectiveness of a perimeter-based security architecture and provides many new types of risks. These applications can be used by an attacker to obtain initial access into the ... [more]


cover image

Performance Tuning for IBM Security Directory Server
Security

Redpaper, published 2 Apr 2014

In today’s highly connected world, directory servers are the IT cornerstone of many businesses. These components of the corporate infrastructure are the foundation of authentication systems for internal and, more commonly, external user populations. Managing a directory server with several hundred internal users is not all that difficult. However, managing a directory server with several million external users in all 24 time zones throughout the world is a much more daunting task. IBM® Security Directory Server software can handle millions of entries, given the right architecture, ... [more]


cover image

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Security

Redbooks, published 12 Apr 2013, last updated 6 Feb 2014

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external ... [more]


cover image

Centralized Key Management using the IBM Enterprise Key Management Foundation
z Systems

Solution Guide, published 13 Jul 2013

Looking at the pervasiveness of encryption today, you can understand the challenge an organization faces with managing the cryptography infrastructure and the encryption keys and certificates for their IT infrastructures. Financial institutions use encryption to secure payments as they face compliance requirements from the Payment Card Industry (PCI): the PCI-PIN and PCI-DSS requirements. Other organizations have to deal with the protection of personal data, for example, the public sector, insurance companies, and healthcare providers. They must comply with complex regulations, such as the ... [more]


cover image

Realizing Efficient Enterprise Security Intelligence by Using IBM Security Intelligence Solutions
Security

Redguide, published 9 May 2013

No matter how large or small an organization, the demands for security intelligence are growing. Organizations of all sizes face tremendous challenges to keep their assets secure. Most organizations use heterogeneous IT technologies and software solutions that produce a wide variety of disparate data. Such technologies and solutions include compliance and vulnerability scans, IDS/IPS alerts, asset data, access logs, and more. They monitor and track network performance, monitor and track application security, and collect and manage event logs in an attempt to meet overall IT objectives. Also, ... [more]


cover image

Security for Linux on System z: Securing Your Network
z Systems

Web Doc, published 22 Feb 2013

The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies that this platform uses. These technologies can potentially harden the overall security by providing centralized management capabilities and reducing the number of control checks compared to a server farm that is based on physically distributed servers. This web document describes the best practices for securing your network. It was written as as part of ... [more]


cover image

Security for Linux on System z
z Systems

Redbooks, published 10 Jan 2013

No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



Follow IBM Redbooks

Follow IBM Redbooks