Ultimate Security with the IBM z13

IBM Redbooks Solution Guide

Published 14 January 2015, updated 13 February 2015

Authors: Lydia Parziale

Abstract

There are benefits to using the IBM® z13™ cryptographic hardware. It supports the use of Central Processor Assist for Cryptographic Functions (CPACF) and Crypto Express5S through in-kernel crypto APIs and the libica cryptographic functions library. Here are the benefits of these features:

* File system encryption
* Communication encryption (to applications such as IBM HTTP Server)
* System security by providing advanced cryptographic functions

This IBM Redbooks® Solution Guide explains how the IBM z13 can help your organization maintain the highest level of security that is possible.

Contents

Analytics, mobile, social, and cloud computing all have one thing in common: They need a platform that has a deeply integrated security stack. This is where IBM® z Systems™ excel. To help counter the many threats to your business in the current world, including hackers looking to penetrate your systems and government-backed attacks, z Systems offers a platform with layers of defense to protect your customer data, intellectual property, and your reputation.


Special Notices

This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a client responsibility and depends upon the client's ability to evaluate and integrate them into the client's operational environment.

Follow IBM Redbooks

Follow IBM Redbooks