This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with System z hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of z/OS and other operating systems that offer a variety of customizable security elements within the framework of the security server and communication server components. We discuss z/OS and other operating systems and additional software that leverages the building blocks of System z hardware to provide solutions to business security needs.
This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Table of contents
Part 1. Introduction
Chapter 1. Introduction
Chapter 2. Security of the IBM Mainframe: yesterday and today
Part 2. Technical view
Chapter 3. z/Architecture: hardware and z/OS concepts
Chapter 4. Virtualization
Chapter 5. z/VM Security
Chapter 6. Other operating systems
Chapter 7. z/OS Security
Chapter 8. Hosting the building blocks of IBM Security Framework in z/OS
Chapter 9. Security exploiters
Chapter 10. Solution pattern example
Others who downloaded this publication also downloaded