End to End Security with z Systems

An IBM Redpaper publication

Abstract

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

Table of contents

Chapter 1. Introduction
Chapter 2. Security Overview
Chapter 3. Use case

Profile

Publish Date
03 April 2015


Rating:
(based on 9 reviews)


Author(s)

ISBN-10
0738454192

ISBN-13
9780738454191

IBM Form Number
REDP-5153-00

Number of pages
50