Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

25 Sep 2015, Redbooks ... This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security ...

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

2 Nov 2015, Redbooks ... This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent ...

Securing the IBM Mainframe

27 Mar 2015, Solution Guide ... Cybercrime is a sophisticated activity. It is no longer a playing field for “script-kiddies” trying to get access to systems and servers for fun, and it is not about quick hacks to get in and get out quickly. It is now about real ...

End to End Security with z Systems

3 Apr 2015, Redpapers ... This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It ...

Cloud Security Guidelines for IBM Power Systems

9 Mar 2016, Redbooks ... This IBM® Redbooks® publication is a comprehensive guide that covers cloud security considerations for IBM Power Systems™. The first objectives of this book are to examine how Power Systems can fit into the current and developing cloud ...

IBM Spectrum Scale Security

25 Jan 2017, Redpapers ... Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized ...

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE

19 Oct 2016, Redbooks ... As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your ...

Securing Your Mobile Mainframe

29 Dec 2015, Point-of-View ... To achieve business goals today, Systems of Record (SoR) that are serving transactional and data services must interface with Systems of Engagement (SoE) that are increasingly represented by mobile devices. System security and integrity is ...

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

6 Feb 2014, Redbooks ... Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business ...

Introduction to the New Mainframe: Security

25 Apr 2007, Redbooks ... This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the ...

WebSphere Security Fundamentals

31 Mar 2005, Redpapers ... This IBM Redpaper is an overview of IT security for WebSphere products. Its purpose is to provide basic information about IT security and specific details about WebSphere security. This can be used as a standalone paper with information ...

Empowering Security and Compliance Management for the z/OS RACF Environment using IBM Tivoli Security Management for z/OS

12 Aug 2010, Redpapers ... Every organization has a core set of mission-critical data that requires protection. Security lapses and failures are not simply disruptions, they can be catastrophic events with consequences felt across the enterprise. The inadvertent ...

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS

15 Dec 2011, Redbooks ... Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. ...

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

18 Aug 2011, Redbooks ... Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As ...

Security in WebSphere Application Server V6.1 and J2EE 1.4 on z/OS

26 Dec 2007, Redbooks ... This IBM® Redbooks® publication was written with the objective to provide a technical description of some of the most important security scenarios available with WebSphere® Application Server Version 6.1 for z/OS®. We chose scenarios that ...

IBM z/OS V2R2: Security

17 Dec 2015, Redbooks ... This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced to the security areas with IBM z/OS® V2R2. The following chapters are included: - Chapter 1, “RACF updates” on page 1: In this ...

AS/400 Internet Security: Developing a Digital Certificate Infrastructure

17 Feb 2000, Redbooks ... This IBM Redbooks publication is the first publication that shows in a complete picture how digital certificates can be used for security on the AS/400 system. One of the reasons why many customers should consider using digital ...

Lotus Security Handbook

7 Apr 2004, Redbooks ... This IBM Redbooks publication provides best practices and guidance for building a secure collaboration infrastructure utilizing IBM Lotus technologies. It is the third Lotus security oriented book to be published. However, unlike the ...

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security

22 Mar 2016, Redbooks ... This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the ...

Security in Development: The IBM Secure Engineering Framework

18 Mar 2010, Redguides ... IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations ...

IBM Security Access Manager Appliance Deployment Patterns

2 Nov 2015, Redpapers ... IBM® Security Access Manager is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. It is offered both as a physical appliance and as a virtual appliance image that runs on ...

Securely Adopting Mobile Technology Innovations for Your Enterprise Using IBM Security Solutions

11 Jul 2013, Redguides ... Many organizations around the world are undergoing a mobile business transformation to achieve higher efficiencies, improve client relations, and increase business growth. There has been immense growth in mobile device and tablet sales. ...

Realizing Efficient Enterprise Security Intelligence by Using IBM Security Intelligence Solutions

9 May 2013, Redguides ... No matter how large or small an organization, the demands for security intelligence are growing. Organizations of all sizes face tremendous challenges to keep their assets secure. Most organizations use heterogeneous IT technologies and ...

IBM System i Security Guide for IBM i5/OS Version 5 Release 4

13 Dec 2007, Redbooks ... The IBM System i family, with its operating system IBM i5/OS, is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i platform provides a rich ...

Securing Your Mobile Business with IBM Worklight

7 Oct 2013, Redbooks ... The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle. This IBM ...

Security on IBM z/VSE

19 Nov 2011, Redbooks ... One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized ...

Flexible Policy Management for IT Security Services Using IBM Tivoli Security Policy Manager

17 Mar 2009, Redguides ... In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to ...

Security Zones on IBM System z: Defining and Enforcing Multiple Security Zones

17 Feb 2011, Redguides ... Many customers wanting to do Linux® server consolidation and deployment to IBM® System z® experience challenges in balancing the security of a physical “air gap” with the low cost of consolidation on a single box: It goes against their ...

Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System

17 Feb 2011, Redguides ... In this IBM® Redguide™ publication, we look closely at network-related security risks such as targeted attacks, worms, bots, intrusion attempts, phishing scams, and so on. These threats target vulnerabilities in IT systems, workstations, ...

Security Functions of IBM DB2 10 for z/OS

14 Sep 2011, Redbooks ... IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with ...

OS/390 Security Server 1999 Updates: Installation Guide

22 Aug 2000, Redbooks ... This IBM Redbooks publication will help you to install, configure and exploit the latest security enhancements to the SecureWay Security Server for OS/390 and the IBM Communication Server. Using examples, we show you how to maximize the ...

AIX V6 Advanced Security Features Introduction and Configuration

26 Aug 2013, Redbooks ... AIX Version 6.1 provides many significant new security technologies and security enhancements. The purpose of this IBM Redbooks publication is to highlight and explain the security features at the conceptual level, as well as provide ...

Security Guide for IBM i V6.1

28 May 2009, Redbooks ... The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of ...

AS/400 Internet Security Scenarios: A Practical Approach

14 Jul 2000, Redbooks ... Learn how to exploit your AS/400 integrated network security functions. Today, network administrators face the challenge of implementing layered security architectures to protect their networks from the increasing sophistication of ...

Security Configuration in a TCP/IP Sysplex Environment

12 May 2003, Redbooks ... This IBM Redbooks publication will help those Parallel Sysplex installations that are considering serving users over non-secure TCP/IP networks, such as the Internet, to achieve a broad understanding of the threats to their security. It ...

z/OS 1.6 Security Services Update

16 Aug 2005, Redbooks ... This IBM Redbooks publication describes the z/OS Security Services provided by z/OS as of z/OS 1.6. As this is a vast subject and some of these services have already been addressed by other redbooks, usually in the OS/390–z/OS 1.2 time ...

WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook

21 Jun 2005, Redbooks ... What do you think of when someone mentions z/OS security? Probably of something that is trustworthy, or even impenetrable. Perhaps you also think of something that is a little complex and challenging to administer. What comes to mind when ...

WebSphere MQ Security in an Enterprise Environment

8 May 2003, Redbooks ... This IBM Redbooks publication considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 ...

WebSphere Application Server on z/OS and Security Integration

4 Jul 2006, Redpapers ... This IBM Redpaper addresses the need for information in the area of integrating security between WebSphere Application Server on z/OS and the outside world. In most cases, multiple security registries exist within a company with a ...

Sysplex eBusiness Security z/OS V1R7 Update

26 Sep 2006, Redbooks ... This IBM Redbooks publication provides an overview of the z/OS Security setups for Parallel Sysplex installations that are considering serving users locally or over non-secure TCP/IP networks. It provides insight into what can be done to ...

Securing DB2 and Implementing MLS on z/OS

3 Apr 2007, Redbooks ... Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks. Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the ...

z/OS UNIX Security Fundamentals

4 Feb 2007, Redpapers ... This IBM Redpaper introduces the z/OS UNIX security model and implementation to MVS knowledgeable and security-minded users. It does not address in detail all the wealth of specific security features available in z/OS UNIX, but rather the ...

Designing for Solution-Based Security on z/OS

16 Oct 2008, Redbooks ... This IBM Redbooks publication provides solution designers and architects with a comprehensive view of the security services they can exploit on z/OS, whether their application is hosted by z/OS or by another platform. It also discusses, at ...

IBM Tivoli Security Solutions for Microsoft Software Environments

30 Sep 2008, Redpapers ... You can use IBM® Tivoli® Security products to build open, flexible, and scalable solutions to address business requirements in the areas of: -- Identity and access management -- Security information and event management One of the many ...

Understanding SOA Security Design and Implementation

29 May 2008, Redbooks ... Securing access to information is important to any business. Security becomes even more critical for implementations structured according to Service-Oriented Architecture (SOA) principles, due to loose coupling of services and ...

Enterprise Security Architecture Using IBM Tivoli Security Solutions

6 Aug 2007, Redbooks ... This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control, identity management, and federation throughout extensive e-business ...

Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security

2 Nov 2009, Redpapers ... Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and ...

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

15 Jul 2010, Redbooks ... To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized ...

IBM Security Key Lifecycle Manager for z/OS: Deployment and Migration Considerations

7 Oct 2011, Redpapers ... This IBM® Redpaper™ publication discusses IBM Security Key Lifecycle Manager (ISKLM) for IBM z/OS® V1.1 and includes topics that discuss encryption capabilities, installation considerations, keystores, auditing, troubleshooting, and ...

IBM Security Solutions Architecture for Network, Server and Endpoint

17 Feb 2011, Redbooks ... Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors of these threats are using resources without anybody being aware that those ...

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

26 Oct 2011, Redbooks ... In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be ...

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

22 Aug 2012, Redbooks ... Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is ...

Integrating IBM Security and SAP Solutions

19 Mar 2012, Redbooks ... Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a ...

IBM Tivoli Security and System z

28 Jan 2008, Redpapers ... This IBM Redpaper is a summary of the coverage of our products (Tivoli Security products) on the mainframe, or System z, both in what runs on System z and what management/security of System z resources we can provide. This paper ...

Java Message Service (JMS) Security on z/OS

27 Nov 2006, Redpapers ... This paper discusses the usage of Java Message Service (JMS) on z/OS and focuses on the security aspects. Java Message Service (JMS) applications can be deployed using the Service Integration Bus (SIB) or using WebSphere MQ as messaging ...

Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS

30 Oct 2006, Redpapers ... This Redpaper describes how to integrate Tivoli Access Manager for e-business Version 6 (TAMeb) and WebSphere Application Server Version 6 on z/OS. It primarily focuses on the following areas: Junctions to back-end servers - Creating and ...

WebSphere Application Server V7.0 Security Guide

25 Apr 2011, Redbooks ... This IBM® Redbooks® publication provides the information that is needed to implement secure solutions with WebSphere® Application Server V7.0. It focuses on security for the application server and its components, including enterprise ...

IBM WebSphere Application Server V6.1 Security Handbook

15 Jun 2009, Redbooks ... This IBM® Redbooks® publication is part of the IBM WebSphere® V6.1 series. It focuses on security and related topics, as well as provides technical details for designing and implementing secure solutions with WebSphere. Designed for IT ...

Streamline Management of the IBM z Systems Host Cryptographic Module Using IBM Trusted Key Entry

12 Nov 2015, Point-of-View ... Every organization has the goal and responsibility to ensure data confidentiality, integrity, and authenticity. Cryptographic systems are extensively used to provide the security needed for data transport. Cryptographic systems use keys to ...

Ultimate Security with the IBM z13

13 Feb 2015, Solution Guide ... There are benefits to using the IBM® z13™ cryptographic hardware. It supports the use of Central Processor Assist for Cryptographic Functions (CPACF) and Crypto Express5S through in-kernel crypto APIs and the libica cryptographic functions ...

Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection

16 Jul 2014, Redguides ... In networks today, organizations are faced with hundreds of new web and non-web applications that are available to their users. Social media applications, peer-to-peer file transfer applications, Voice over Internet Protocol (VoIP), ...

Secure Messaging Scenarios with WebSphere MQ

2 Apr 2013, Redbooks ... The differences between well-designed security and poorly designed security are not always readily apparent. Poorly designed systems give the appearance of being secure but can over-authorize users or allow access to non-users in subtle ...

Security for Linux on System z

10 Jan 2013, Redbooks ... No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was ...

Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

30 Jan 2013, Redbooks ... IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that ...

Enabling B2C Solutions with Identity and Access Management

15 Sep 2014, Redguides ... Traditionally, Identity and Access Management (IAM) solutions have been targeted to meet business imperatives for establishing control, accountability, and transparency for access permissions across enterprise IT systems and ...

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking

10 Feb 2016, Redbooks ... For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest ...

Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions

2 Nov 2005, Redbooks ... Today, companies have no way to trust identities belonging to their partners, suppliers, contracts and their outsourcers. This lack of trust means companies end-up creating online identities (and passwords) for all users. This approach is ...

IBM z/OS V1R10 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking

26 Apr 2010, Redbooks ... For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest ...

IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

10 Feb 2016, Redbooks ... For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world’s computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest ...

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

11 Sep 2012, Redbooks ... Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick ...

Improving Your Web Application Software Development Life Cycle's Security Posture with IBM Rational AppScan

29 May 2009, Redguides ... Hackers on the Internet have evolved from fame-hungry sabotage to fraud to profitable organized data and identity theft. As this evolution continues, it is important for business leaders to consider the security of their Web applications ...

A Sweeping Approach to Security

29 Nov 2012, Point-of-View ... Businesses and governments today must take a broader approach to securing information from malicious attackers or infiltrators. This task is not easy when users demand fast and convenient access to information that they expect to be ...

Using IBM Tivoli Key Lifecycle Manager: Business Benefits and Architecture Overview

27 Oct 2009, Redguides ... Increasing global integration affects organizations in many positive ways, but it also presents challenges. The volume of data that moves within an organization and among organizations across the globe grows dramatically with increased ...

CA-TopSecret to OS/390 Security Server Migration Guide

9 Oct 2000, Redbooks ... CA-Top Secret and the OS/390 Security Server are both sophisticated products. In some areas their designs are similar, and in other areas the designs are very different. Planning a migration from CA-Top Secret to the RACF element of the ...

CA-ACF2 to OS/390 Security Server Migration Guide

10 Oct 2000, Redbooks ... CA-ACF2 and the OS/390 Security Server are both sophisticated products. In some areas their designs are similar, and in other areas the designs are very different. Planning a migration from CA-ACF2 to the RACF element of the OS/390 ...

Putting the Latest z/OS Security Features to Work

10 Jun 2002, Redbooks ... Many significant enhancements have been made to the security features available on the z/OS and OS/390 platforms. This IBM Redbooks publication will help you install, customize, and configure the new functions provided with Version 1.2 of ...

Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS

11 Sep 2005, Redbooks ... Integrating an IBM WebSphere Application Server for z/OS cluster with IBM Tivoli Access Manager is challenging. Tailoring the business this way allows administrators to facilitate the best of both worlds, so they can focus WebSphere ...

Understanding IT Perimeter Security

2 Nov 2009, Redpapers ... This IBM Redpaper publication takes a close look at the enterprise IT network perimeter, which has been diluted from a well-defined set of ingress and egress points to a mesh of undetectable flows from devices capable of accessing and ...

Smart Cloud Enterprise Tivoli Service Automation Manager Security Guide

16 Nov 2012, Redpapers ... The security for Tivoli® Service Automation Manager primarily relies on the underlying components of IBM® DB2®, WebSphere® Application Server, and IBM Tivoli Directory Server. The configuration steps to enable and manage security for ...

Communications Server for z/OS V1R9 TCP/IP Implementation Volume 4: Security and Policy-Based Networking

26 Apr 2010, Redbooks ... This Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand, step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP ...

OpenPGP Key Exchange and Migration

6 Aug 2007, Redpapers ... This Redpaper describes the steps for exchanging OpenPGP certificates, X.509 certificates, and public/private key pairs, using the OpenPGP support and IBM Java 5 SDK tools: keytool and hwkeytool. Since the main focus is to describe the ...

Security on z/VM

5 Dec 2007, Redbooks ... Discussions about server sprawl, rising software costs, going green, or moving data centers to reduce the cost of business are held in many meetings or conference calls in many organizations throughout the world. And many organizations are ...

z/OS Version 1 Release 8 RACF Implementation

12 Feb 2007, Redbooks ... This IBM Redbooks publication describes the implementation of RACF® in z/OS® Version 1 Release 8. This release continues to deliver industry leadership for security. Improvements have been introduced to further enhance the security-rich ...

Java Security on z/OS - The Complete View

5 Jan 2009, Redbooks ... This IBM Redbooks publication describes and explains which z/OS security services can be exploited by Java stand-alone applications executing on z/OS. It is intended for experienced z/OS users with a moderate knowledge of Java, and ...

Federated Identity and Trust Management

15 May 2008, Redpapers ... This IBM Redpaper discusses the IBM Tivoli software strategy and roadmap for a consistent, unified, and evolutionary approach to securing cross-enterprise e-business solutions. Built on open security standards, with tight integration to ...

IBM Tivoli Security Policy Manager

17 Feb 2009, Redpapers ... In a growing number of enterprises, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals that are established and driven by the business need to ...

Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding

28 Oct 2009, Redguides ... In today's dynamic business environments, an organization develops relationships with its customers, contractors, and business partners at a faster pace than ever before. One of the major concerns across all types of organizations is the ...

IBM z/OS V1R12 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

27 Jul 2011, Redbooks ... For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world’s computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world ...

Implementing CICS Web Services

9 Oct 2007, Redbooks ... The Web services support in CICS Transaction Server Version 3.1 enables your CICS programs to be Web service providers or requesters. CICS supports a number of specifications including SOAP Version 1.1 and Version 1.2, and Web services ...

J2C Security on z/OS

6 Nov 2006, Redpapers ... This paper describes security options of IBM WebSphere Application Server and Enterprise Information Systems (EIS) when using J2EE Connector Architecture (J2C) connectors. We cover the following topics: J2EE Connector Security Security ...

Securing Access to CICS Within an SOA

11 Dec 2006, Redbooks ... With the emergence of service-oriented architecture (SOA), the options for accessing the existing IBM Customer Information Control System (CICS) assets have become more varied than ever. With this variety comes the complexity of securing ...

Enhancing Password Management by Adding Security, Flexibility, and Agility

7 Dec 2012, Solution Guide ... The number of logins and passwords that employees must manage on a daily basis continues to be a source of frustration and lost productivity. Employees must remember login information for numerous applications. Many of these applications ...

Addressing Identity, Access and Compliance Requirements using IBM Tivoli Identity and Access Assurance

23 Sep 2010, Redpapers ... Today, security is a concern for everyone, from members of the board to the data center. Each day another data breach occurs. These incidents can affect an organization's brand, investment return, and customer base. Time spent managing ...

IBM Business Process Manager Security: Concepts and Guidance

18 Sep 2012, Redbooks ... This IBM® Redbooks® publication provides information about security concerning an organization’s business process management (BPM) program, about common security holes that often occur in this field, and describes techniques for rectifying ...

Migration to CICS Transaction Server for z/VSE V2.1

10 May 2017, Redbooks ... The IBM® CICS® Transaction Server for z/VSE® (CICS TS for z/VSE) 2.1 provides functions to improve application programming, system programming, system management, and data security and availability. With CICS TS for z/VSE 2.1, you can use ...

IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

21 Mar 2017, Redbooks ... For more than 50 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases, and mission-critical enterprise-wide applications. IBM z® Systems, the latest ...

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture

25 Aug 2016, Web Doc ... Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM® BigInsights® platform processes large amounts of data by breaking the computation into smaller tasks that can be ...

Industrial Controls Security

6 Jan 2016, Redguides ... As cybersecurity threats evolve, we must adapt the way to fight them. The typical countermeasures are no longer adequate, given that advanced persistent threats (APTs) are the most imminent attacks that we face today. This IBM® Redguide™ ...

Enhancing Your Mobile Enterprise Security with IBM Worklight

20 Aug 2013, Solution Guide ... The IBM® Worklight mobile application platform helps organizations develop, deploy, host, and manage mobile enterprise applications. IBM Worklight provides tools for every stage of the mobile application development and deployment process. ...

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager

16 Mar 2015, Redbooks ... Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect ...

Security and Compliance Solutions for IBM Informix Dynamic Server

7 Mar 2008, Redbooks ... In this IBM Redbooks publication, we discuss, in detail, the security features available in IBM Informix Database Server (IDS). These enriched IDS security features provide you with the capability to protect your data and comply with ...

DB2 Security and Compliance Solutions for Linux, UNIX, and Windows

10 Jun 2008, Redbooks ... In this IBM Redbooks publication we discuss the existing and new DB2 security features introduced in DB2 9.5 for Linux, UNIX, and Windows. These enriched DB2 security features provide you with the capability to protect your data and comply ...

IBM System Storage N series Multiprotocol Use Guide

3 Sep 2007, Redbooks ... Many customer sites need to access data from both Windows and UNIX clients. For these environments, Data ONTAP has native multiprotocol support. After the user is authenticated on the network, if the user has both appropriate share or ...

IBM System Storage N series Best Practices for Secure Configuration

16 Dec 2008, Redpapers ... This IBM Redpaper provides guidelines for the secure configuration of IBM System Storage N series running Network Appliance Data ONTAP. It is intended for storage and security administrators that wish to improve the overall security ...

z/OS Version 1 Release 3 and 4 Implementation

16 Jun 2003, Redbooks ... In this IBM Redbooks publication, we highlight many enhancements made in z/OS Version 1 Release 3 and Release 4, and show how to use this document to help you install, tailor, and configure these releases. First we provide a broad ...

Linux on IBM eServer zSeries and S/390: Best Security Practices

20 May 2004, Redbooks ... This IBM Redbooks publication discusses best security practices for running Linux as a z/VM guest on IBM eServer zSeries and S/390 machines. This publication is intended for system administrators and IT architects responsible for deploying ...

IBM i5/OS Network Security Scenarios A Practical Approach

11 Dec 2007, Redbooks ... This IBM® Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS ...

Secure Your E-mail Server on IBM eServer i5 with Linux

30 Oct 2005, Redpapers ... This IBM Redpaper will help you design a solution to protect your e-mail servers on IBM eServer i5 using various security solutions of Linux. Like many of Linux solutions, security implementation can be done using either free software ...

Additional AIX Security Tools on IBM eServer pSeries, IBM RS/6000, and SP/Cluster

18 Jan 2001, Redbooks ... From firewalls to operating system hardening, this IBM Redbooks publication illustrates additional tools and techniques that you can use to enhance the security environment of your IBM eServer pSeries, IBM RS/6000 workstation, SP, or ...

WebSphere Portal Collaboration Security Handbook

21 Dec 2004, Redbooks ... Security is the hottest topic in the current Web-centric computing environment. This issue becomes the single largest concern for IT professionals who are stakeholders for Web applications, such as administrators, programmers, and ...

IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking

26 Apr 2010, Redbooks ... Note: This PDF is over 900 pages, so when you open it with Adobe Reader and then do a "Save As", the save process could time out. Instead, right-click on the PDF and select "Save Target As". For more than 40 years, IBM® mainframes ...

Communications Server for z/OS V1R8 TCP/IP Implementation Volume 4: Policy-Based Network Security

18 Jan 2007, Redbooks ... This Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP and ...

SSL Server Implementation for z/VM 5.2

17 Oct 2007, Redpapers ... This IBM Redpaper publication gives a broad understanding of how to set up and configure the SSL server of z/VM 5.2 in a short time frame. It also provides an easy method to protect the communication to z/VM server, especially for ...

Encryption Facility R2 for z/OS Performance

7 Jul 2007, Redpapers ... IBM Encryption Facility for z/OS exploits the existing strengths of the mainframe and the IBM z/OS operating system. It is a host-based facility that leverages existing centralized key management in z/OS and the hardware encryption ...

A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On

16 Feb 2012, Redpapers ... IBM® Security Access Manager for Enterprise Single Sign-On introduces a new level of security, authentication, and automation experience to business enterprise users on their desktop applications. On a day-to-day basis, the number of ...

Securing CICS Web Services

2 Dec 2008, Redbooks ... Securing access to information is important to any business, especially for business-critical systems that manage sensitive data, as is often the case for systems based on IBM® Customer Information Control System (CICS®). Security becomes ...

DataPower Architectural Design Patterns: Integrating and Securing Services Across Domains

13 Oct 2008, Redbooks ... IBM® WebSphere® DataPower® SOA Appliances are purpose-built network devices that offer a wide variety of functionality such as the securing and management of SOA Applications, enterprise service bus integration, and high speed XSL ...

Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement

19 Mar 2006, Redbooks ... Strong security has always been part of the family of Lotus software products. More notably, it has been a feature that has made Lotus Notes and Domino an industry leader for security-rich messaging, calendar, and scheduling capabilities. ...

Single Sign-On Solutions for IBM FileNet P8 Using IBM Tivoli and WebSphere Security Technology

24 Nov 2009, Redbooks ... Authentication is the act of verifying a user's identity based on the credentials that they have presented. Establishing each user's identity is a critical first step in any client/server based system. In this IBM® Redbooks® publication, ...

Identity Management Design Guide with IBM Tivoli Identity Manager

6 Nov 2009, Redbooks ... Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the ...

Exploring the integration between IBM Tivoli Identity Manager and IBM Tivoli Access Manager for Enterprise Single Sign-On

18 Jun 2007, Redpapers ... There is a standard integration provided between IBM Tivoli Identity Manager and IBM Tivoli Access Manager for Enterprise Single Sign-on by provisioning credentials through the IBM Tivoli Access Manager for Enterprise Single Sign-on ...

Reverse Password Synchronization with IBM Tivoli Identity Manager

13 May 2007, Redpapers ... This IBM Redpaper describes how the IBM Tivoli Identity Manager Reverse Password Synchronization mechanism works. This mechanism is used by most clients as a vital component of their Tivoli Identity Manager deployment, but there are areas ...

Identity Management for IBM Cognos 8 with IBM Tivoli Identity Manager

9 Feb 2010, Redpapers ... This IBM® Redpaper™ publication describes how IBM Tivoli® Identity Manager can be used as a comprehensive identity management solution for IBM Cognos® 8. IBM Cognos 8 provides a security architecture that is flexible and compatible with ...

WebSphere MQ V6, WebSphere Message Broker V6, and SSL

20 Nov 2006, Redpapers ... This IBM Redpaper provides step-by-step guides to implement IBM WebSphere MQ Secure Sockets Layer (SSL) channels in a variety of configurations: Microsoft Windows to and from Windows WebSphere MQ clients to WebSphere MQ ...

IBM Spectrum Virtualize Considerations for PCI-DSS Compliance

3 Oct 2017, Redpapers ... The Payment Card Industry Data Security Standard (PCI-DSS) is the global information security standard for organizations that process, store, or transmit data with any of the major credit card brands. More and more organizations are ...

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support

23 Dec 2016, Redpapers ... What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger ...

Tools and Solutions for Modernizing Your IBM i Applications

31 May 2017, Redpapers ... This IBM® Redpaper™ publication is a companion to the Modernize IBM i Applications from the Database up to the User Interface and Everything in Between, SG24-8185 IBM Redbooks® publication. It describes independent software vendor (ISV) ...

Understanding Cloud Security Guidelines for IBM Power Systems

18 Dec 2014, Solution Guide ... This IBM Redbooks Solution Guide is an initial guide that introduces cloud security considerations for IBM® Power Systems™. Power Systems are uniquely suited for cloud environments, with their industry leading virtualization, ...

Security for Linux on System z: Securing Your Network

22 Feb 2013, Web Doc ... The best practices to manage IT security are already documented by several sources. The practices can certainly be used to also secure Linux on System z. However, when you define the security policies, consider several unique technologies ...

IBM PowerSC Trusted Surveyor Technical Overview

8 May 2013, Solution Guide ... IBM PowerSC™ provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM™ and IBM AIX®. Security control and compliance are some of the key components that ...

DB2 for z/OS: Configuring TLS/SSL for Secure Client/Server Communications

19 Mar 2015, Redpapers ... This IBM® Redpaper™ publication provides information about how to set up and configure IBM DB2® for z/OS® with Transport Layer Security (TLS), the modern version of Secure Sockets Layer (SSL). This configuration is accomplished using the ...

ABCs of IBM z/OS System Programming Volume 6

12 Aug 2014, Redbooks ... The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs ...

Integrated Identity and Access Management Architectural Patterns

29 May 2008, Redpapers ... Customers implement an integrated Identity and Access Management (IAM) solution to address many business requirements. The overall driving requirement is to provide a combination of business processes and technologies to manage and secure ...

IBM eServer iSeries Wired Network Security: OS/400 V5R1 DCM and Cryptographic Enhancements

10 Jul 2001, Redbooks ... With the increasing number of customers that conduct business over the Internet or other untrusted networks, there is a rising demand to protect data traffic. This IBM Redbooks publication focuses on the network security enhancements that ...

IBM Tivoli Access Manager for e-business

28 Apr 2005, Redpapers ... Web technologies have revolutionized the delivery of information and services. Providing business functions, such as customer service, sales, and purchasing, through the Web is a prerequisite to competitiveness. Customers, partners, and ...

Using LDAP for Directory Integration

11 Feb 2004, Redbooks ... Directories are key for a successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards ...

Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security

28 Mar 2006, Redbooks ... This new and improved Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the ...

Encryption Facility for z/OS V1.2 OpenPGP Support

23 Sep 2007, Redbooks ... This book is about the OpenPGP support available in the Encryption Facility for z/OS V1.2 (Program Product 5655-P97). It begins with a discussion of the principles of operation of the OpenPGP protocol and a review of some basic ...

Set Up Security and Integration with the DataPower XI50z for zEnterprise

20 Dec 2011, Redbooks ... This IBM® Redbooks® publication discusses the new IBM WebSphere® DataPower® Integration Appliance XI50 for zEnterprise™ that bridges the gap between mainframe and distributed. The DataPower XI50z (a multifunctional appliance) within the ...

Robust Data Synchronization with IBM Tivoli Directory Integrator

25 May 2006, Redbooks ... Don’t be fooled by the name; IBM Tivoli Directory Integrator integrates anything, and it is not in any way limited to directories. It is a truly generic data integration tool that is suitable for a wide range of problems that usually ...

A Guide to Writing Advanced Access Profiles for IBM Tivoli Access Manager for Enterprise Single Sign-On

15 Aug 2011, Redpapers ... IBM® Tivoli® Access Manager for Enterprise Single Sign-On enables users to access all their applications, including web, desktop and heritage, and network resources, with the use of a single strong password. The solution helps simplify ...

IBM Tivoli Access Manager for e-business: Tracing HTTP Connections

3 Dec 2009, Redpapers ... When troubleshooting IBM® Tivoli® Access Manager for e-business it is often necessary to obtain and analyze the traces of HTTP connections. In this IBM Redpaper™ document you will learn how to obtain such traces, and how to interpret ...

Deployment Guide Series: IBM Tivoli Access Manager for e-business V6.0

1 Jul 2008, Redbooks ... Deploying an access control solution for a medium-size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, its deployed infrastructure, and the application ...

Utilizing Group Sharing Account User Management using the IBM Tivoli Identity Manager Adapter for Tivoli Access Manager for Enterprise Single Sign-On

7 Dec 2010, Redpapers ... In the 5.1 release of the IBM® Tivoli® Identity Manager Adapter for Tivoli Access Manager for Enterprise Single Sign-On, a has been introduced. This allows multiple users who have a Wallet to have access to credentials for a shared ...

Deployment Guide Series: IBM Tivoli Identity Manager 5.0

10 Dec 2008, Redbooks ... Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the ...

Identity Management Advanced Design for IBM Tivoli Identity Manager

22 May 2008, Redbooks ... Identity and user lifecycle management projects are being deployed more and more frequently - and demand is growing. By demonstrating how IBM Tivoli Identity Manager can be made resilient and adapted to special functional requirements, ...

IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide

1 Apr 2008, Redpapers ... IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, help ...

WebSphere Application Server V7 Flexible Management: Security Configuration Requirements

29 Mar 2012, Redpapers ... IBM® WebSphere® Application Server V7 introduces an administration function called that is designed to facilitate administration of many WebSphere Application Server stand-alone profiles and Federated Network Deployment topologies. This ...

IBM DS8880 Data-at-rest Encryption

6 Sep 2017, Redpapers ... IBM® experts recognize the need for data protection, both from hardware or software failures, and also from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8880 supports encryption-capable hard disk ...

IBM DB2 Web Query for i Version 2.1 Implementation Guide

27 Jan 2014, Redbooks ... Business Intelligence (BI) is a broad term relating to applications designed to analyze data for purposes of understanding and acting on the key metrics that drive profitability in an enterprise. Key to analyzing that data is providing ...

Managing Digital Certificates across the Enterprise

22 Sep 2016, Redbooks ... This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the ...

z/OS PKI Services: Quick Set-up for Multiple CAs

20 Jan 2017, Redbooks ... If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. ...

Performance Tuning for IBM Security Directory Server

2 Apr 2014, Redpapers ... In today’s highly connected world, directory servers are the IT cornerstone of many businesses. These components of the corporate infrastructure are the foundation of authentication systems for internal and, more commonly, external user ...

B2B Appliances: Creating Customer Value Through Exceptional B2B Messaging Performance and Security

17 Mar 2009, Redguides ... As organizations move to on demand businesses by implementing a service-oriented architecture (SOA), the largest barriers continue to be implementation complexity, cost-prohibitive scalability, and data security. To recognize improved time ...

Securing and Auditing Data on DB2 for z/OS

9 Jun 2009, Redbooks ... In this age of complex regulatory oversight and wide ranging threats to corporate data, securing a company's information assets from internal and external threats has become a primary focus and concern for information professionals. IBM® ...

Securing NFS in AIX An Introduction to NFS v4 in AIX 5L Version 5.3

8 Nov 2004, Redbooks ... NFS Version 4 (NFS V4) is the latest defined client-to-server protocol for NFS. A significant upgrade from NFS V3, it was defined under the IETF framework by many contributors. NFS V4 introduces major changes to the way NFS has been ...

Understanding LDAP - Design and Implementation

18 Jul 2006, Redbooks ... The implementation and exploitation of centralized, corporate-wide directories are among the top priority projects in most organizations. The need for a centralized directory emerges as organizations realize the overhead and cost involved ...

IBM Tivoli Key Lifecycle Manager for z/OS

6 Aug 2009, Redpapers ... This IBM® Redbooks® publication provides details of a new offering called IBM Tivoli® Key Lifecycle Manager. We introduce the product, provide planning suggestions, and detail the installation of IBM Tivoli Key Lifecycle Manager on the ...

IBM Tivoli Directory Server for z/OS

7 Jul 2011, Redbooks ... This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying ...

Optimizing Your Oracle Investment with IBM Storage Solutions

12 Apr 2012, Redpapers ... IBM® offers true enterprise class storage support for Oracle deployments at a low total cost of ownership (TCO). With disk, tape, storage network hardware, consolidated management console, storage software, and security software, IBM can ...

Encryption Facility for z/OS Version 1.10

22 Jan 2007, Redbooks ... This IBM Redbooks publication introduces IBM Encryption Facility for z/OS, Program Product 5655-P97, from the description of its principles of operation to information related to its setup intended for system programmers and security ...

Propagating Identity in SOA with Tivoli Federated Identity Manager

8 Jan 2008, Redpapers ... SOA connects loosely coupled services to construct new applications. These services have their own user registries that are often administered in isolation from those of other services in the SOA environment. Users and service entities in ...

CICS Transaction Gateway for z/OS Version 6.1

21 May 2006, Redbooks ... The CICS Transaction Gateway (CICS TG) is used widely to provide access to CICS programs from Java environments. It provides the IBM implementation of the J2EE Connector Architecture (JCA). This IBM Redbooks publication introduces the new ...

Integrating WebSphere Service Registry and Repository with IBM Tivoli Security Policy Manager

3 Nov 2009, Redpapers ... This IBM® Redpapers™ publication describes the built-in integration between IBM WebSphere Service Registry and Repository (WSRR) and IBM Tivoli Security Policy Manager (TSPM), which allows users to author policies in TSPM and attach them ...

Synchronizing Data with IBM Tivoli Directory Integrator 6.1

15 Jul 2007, Redpapers ... The basic goal of data synchronization is to detect changes in one data source and then propagate these to one or more targets. Discovering and then applying changes is not as easy as you might think. Some systems provide change event ...

Creating IDML Discovery Books with IBM Tivoli Directory Integrator

19 Jan 2009, Redpapers ... IBM® Tivoli® Application Dependency Discovery Manager (TADDM) is a powerful tool for discovering and classifying information about hardware and software assets, along with their relationships and dependencies. In spite of automatic ...

IBM Lotus Domino Integration Using IBM Tivoli Directory Integrator

31 Dec 2009, Redpapers ... In this IBM® Redpaper™ publication we take you step-by-step through a series of integration scenarios to help you start building your own solutions with IBM Tivoli® Directory Integrator. Once you have mastered basic skills you will quickly ...

Configuring Strong Authentication with IBM Tivoli Access Manager for Enterprise Single Sign-On

15 Dec 2011, Redpapers ... IBM® Tivoli® Access Manager for Enterprise Single Sign-On automates sign-on and access to enterprise applications, eliminating the need to remember and manage user names and passwords. Users log on to Tivoli Access Manager for Enterprise ...

IBM Tivoli Access Manager for e-business: Junctions and Links

3 Dec 2009, Redpapers ... IBM® Tivoli® Access Manager for e-business can manage and enforce access control to Web-based resources located on Web servers or Web application servers. It uses "junctions" to identify and address those servers. When a user wants to ...

IBM Tivoli Access Manager for Enterprise Single Sign-On v8.0 Migration Guide for Encentuate 3.4 and 3.5

17 Dec 2009, Redpapers ... IBM® Tivoli® Access Manager for Enterprise Single Sign-On enables organizations to automate access to corporate information, strengthen security, and enforce compliance at the endpoints. Organizations can efficiently manage business risk, ...

Certification Study Guide: IBM Tivoli Identity Manager Version 5.0

23 Feb 2009, Redbooks ... This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Identity Manager V5.0" certification test, test number 934, and is meant for those who want to achieve IBM Certifications for ...

Getting Started with WebSphere MQ File Transfer Edition V7

20 Jan 2010, Redbooks ... WebSphere MQ File Transfer Edition provides an enterprise-ready managed file transfer capability that is both robust and easy-to-use. WebSphere MQ File Transfer Edition exploits the proven reliability and connectivity of WebSphere MQ to ...

Experience JEE Using Rational Application Developer V7.5

27 Jul 2010, Draft Redbooks ... (Note that this book is available in softcopy only.) This IBM® Redbooks® publication is a hands-on guide to developing a comprehensive Java™ EE application using Rational® Application Developer V7.5 and the embedded WebSphere® ...

IBM PowerKVM available with the Linux only scale-out servers

19 Sep 2014, Solution Guide ... IBM® PowerKVM is an open source server virtualization choice based on POWER8™ technology. This IBM Redbooks® Solution Guide describes the Linux open source technology of Kernel-based Virtual Machine (KVM) virtualization, which is designed ...

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

12 Oct 2014, Redbooks ... In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health ...

Summary of Key Functions in z/OS V2.1

9 Oct 2014, Solution Guide ... This IBM® Redbooks® Solution Guide describes IBM z/OS® V2R1, the latest release of the z/OS operating system. This release provides current hardware support for the zEC12 and zBC12 servers, batch modernization features, enhancements to ...

IBM b-type Data Center Networking: Design and Best Practices Introduction

30 Dec 2010, Redbooks ... As organizations drive to transform and virtualize their IT infrastructures to reduce costs, and manage risk, networking is pivotal to success. Optimizing network performance, availability, adaptability, security, and cost is essential to ...

IBM j-type Data Center Networking Introduction

7 May 2010, Redbooks ... As organizations drive to transform and virtualize their IT infrastructures to reduce costs and manage risk, networking is pivotal to success. Optimizing network performance, availability, adaptability, security, and cost is essential to ...

IBM b-type Data Center Networking: Product Introduction and Initial Setup

24 Jun 2010, Redbooks ... As organizations drive to transform and virtualize their IT infrastructures to reduce costs, and manage risk, networking is pivotal to success. Optimizing network performance, availability, adaptability, security, and cost is essential to ...

Using ThinkVantage Technologies: Volume 2 Maintaining and Recovering Client Systems

2 Feb 2006, Redbooks ... ThinkVantage Technologies bring your PCs one step closer to being self-configured, self-optimizing, self-protecting, and self-healing, to help save you time and money throughout the life of your systems. In short, ThinkVantage Technologies ...

PHP: Zend for i5/OS

30 Jan 2007, Redbooks ... This IBM Redbooks publication will help you install, configure, and become productive with PHP on System i using Zend Core for i5/OS and Zend Platform for i5/OS. If you are evaluating PHP, this book will also help by providing background ...

Implementing PKI Services on z/OS

10 Feb 2004, Redbooks ... This IBM Redbooks publication is designed to help you understand and implement Public Key Infrastructure (PKI) Services on z/OS. As an overview of PKI Services on z/OS, this book looks into two different ways of installing PKI Services: ...

Experiences with Oracle Solutions on Linux for IBM System z

27 May 2009, Redbooks ... Linux® for System z® offers many advantages to customers who rely upon the IBM® mainframe systems to run their businesses. Linux for System z takes advantage of the qualities of service in the System z hardware and in z/VM® , making it a ...

System z Crypto and TKE Update

20 Jun 2011, Redbooks ... This IBM® Redbooks® publication provides detailed information about the implementation of hardware cryptography in the System z10® server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing ...

Experience J2EE! Using WebSphere Application Server V6.1 - Update

27 Aug 2008, Draft Redbooks ... This IBM Redbooks publication is a hands-on guide to developing a comprehensive J2EE application, including core functions, security, Web services, and messaging. In the context of J2EE, messaging is also known as Java Message Service ...

Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1

10 Sep 2009, Redbooks ... This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Federated Identity Manager V6.1" certification test, test number 000-891, and is meant for those who want to achieve IBM ...

Considerations for CICS Web Services Performance

20 May 2009, Redbooks ... The Web services support in CICS® Transaction Server Version 3 enables your CICS programs to be Web service providers or requesters. CICS supports a number of specifications including SOAP Version 1.1 and Version 1.2, and Web services ...

Experience J2EE! Using WebSphere Application Server V6.1

30 Jan 2007, Redbooks ... This IBM Redbooks publication is a hands-on guide to developing a comprehensive J2EE application, including core functions, security, Web services, and messaging. In the context of J2EE, messaging is also known as Java™ Message Service ...

DataPower Problem Determination Techniques

5 Aug 2008, Redpapers ... This IBM Redpaper provides a guide to many aspects of problem determination on a DataPower appliance, with an emphasis on powerful troubleshooting utilities. By stepping through various interrelated scenarios, the reader is exposed to ...

Experience Java EE! Using WebSphere Application Server Community Edition 2.1

17 Feb 2009, Redbooks ... This IBM® Redbooks® publication is a hands-on guide to developing a comprehensive Java™ EE application using WebSphere® Application Server Community Edition v2.1 (WASCE), including core functions, security, Web services, and messaging. ...

Robust Integration with Tivoli Directory Integrator 7.0

1 Jun 2010, Redpapers ... What is perfectly acceptable to one person is a potential disaster for another. The concept of availability is closely related to risk tolerance. This document illustrates the options and capabilities that an integration designer can use ...

Creating EIF Events with Tivoli Directory Integrator for Tivoli Netcool/OMNIbus and Tivoli Enterprise Console

11 Oct 2007, Redpapers ... This IBM Redpaper describes a solution developed for IBM Tivoli Directory Integrator integration with the IBM event management offering products, IBM Tivoli Netcool/OMNIbus and IBM Tivoli Enterprise Console. This integration solution ...

Setup and Configuration for IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 for Single-Server and Cluster Environments

7 Nov 2011, Redpapers ... This IBM® Redpaper™ publication covers the detailed step-by-step installation of IBM Tivoli® Access Manager for Enterprise Single Sign-On 8.1 onto a single-server and a clustered environment. This paper supplements the IBM Tivoli Access ...

Certification Study Guide Series: IBM Tivoli Access Manager for Enterprise Single Sign-On 8.0

8 Jan 2010, Redbooks ... This IBM® Redbooks® publication is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli® Access Manager for Enterprise Single Sign-On V8.0" certification test, test number 000-020, and is meant for those who want to ...

Certification Study Guide: IBM Tivoli Access Manager for e-business 6.0

26 Feb 2006, Redbooks ... This IBM Redbooks publication is a study guide for IBM Tivoli Access Manager for e-business Version 6 and is meant for those who want to achieve IBM Certifications for this specific product. The IBM Tivoli Access Manager for e-business ...

Strategic Overview of WebSphere Appliances

2 Feb 2012, Redpapers ... IBM® WebSphere® DataPower® appliances simplify, govern, and optimize the delivery of services and applications and enhance the security of XML and IT services. They extend the capabilities of an infrastructure by providing a multitude of ...

Key Functions in z/OS Version 2 Release 1

9 Dec 2014, Redbooks ... IBM z/OS® Version 2 Release 1 helps you minimize downtime and achieve higher performance and availability. But are you exploiting z/OS to the maximum benefit for your enterprise? This IBM® Redbooks® publication focuses on some of the key ...

Maximizing Performance of IBM DB2 Backups

21 Oct 2016, Web Doc ... This IBM® Redbooks® Analytics Support Web Doc describes how to maximize the performance of IBM DB2® backups. Backing up a database is a critical part of any disaster recovery plan. Making sure that the backup completes in a reasonable time ...

IBM XIV Security with Data-at-Rest Encryption

11 Aug 2014, Redpapers ... With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization’s information is a key part of operating a successful ...

Enhanced Networking on IBM z/VSE

31 Dec 2014, Redbooks ... The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are ...

IBM InfoSphere Information Server Deployment Architectures

17 Jan 2013, Redbooks ... Typical deployment architectures introduce challenges to fully using the shared metadata platform across products, environments, and servers. Data privacy and information security requirements add even more levels of complexity. IBM® ...

Implementing the IBM System Storage SAN32B-E4 Encryption Switch

7 Mar 2011, Redbooks ... This IBM® Redbooks® publication covers the IBM System Storage® SAN32B-E4 Encryption Switch, which is a high-performance stand-alone device designed to protect data-at-rest in mission-critical environments. In addition to helping IT ...

Implementation of IBM j-type Ethernet Switches and Routers

13 Feb 2011, Redbooks ... IBM® j-type data center solutions running Junos software (from Juniper Networks) provide operational agility and efficiency, dramatically simplifying the network and delivering savings. With this solution, a network design has fewer ...

Linux on IBM eServer zSeries and S/390: System Management

11 Mar 2003, Redbooks ... This IBM Redbooks publication describes system management for Linux on IBM eServer zSeries and S/390. It will help you understand the primary management processes for a set of Linux images on zSeries and S/390, and how to identify ...

Running Linux Guest in less than CP Privilege Class G

11 Jun 2004, Redpapers ... This paper provides guidance for hardening a z/VM system running Linux virtual machines in a hostile environment. Access to specific CP commands and resources is granted to a VM user based on the privilege classes assigned to the user. ...

Application Service Provider Business Model: Implementation on the iSeries Server

1 Apr 2001, Redbooks ... This IBM Redbooks publication shows you how to implement an exciting and new business model, called Application Service Provider (ASP), on the IBM eServer iSeries server. ASP is the "how to" base for offering outsourced access to ...

Deploying Citrix MetaFrame on IBM eServer BladeCenter with FAStT Storage

6 Jul 2004, Web Doc ... This technote provides information to help you manage your Citrix MetaFrame server farm running on the IBM eServer BladeCenter, utilizing the IBM TotalStorage FAStT600 Storage Server. ...

Tivoli Directory Server V5.2 Configuration Tool Problem with DB2 UDB 8.2 Fixpack 7a

24 Jul 2005, Web Doc ... The IBM Tivoli Directory Server V5.2 Configuration Tool does not work properly with IBM DB2 UDB V8.2 with Fixpack 7a installed. This technote describes the symptoms of this problem as well as how to fix the ...

RACF Remote Sharing Facility over TCP/IP

30 Aug 2012, Redbooks ... The IBM RACF® remote sharing facility (RRSF) allows RACF to communicate with other IBM z/OS® systems that use RACF, allowing you to maintain remote RACF databases. RRSF support for the security administrator provides these ...

z/OS Version 1 Release 7 Implementation

31 Jan 2006, Redbooks ... This IBM Redbooks publication describes the new functions of z/OS Version 1 Release 7. These functions further strengthen the zSeries platform with enhancements designed to deliver increased availability of z/OS UNIX System Services (z/OS ...

Developing Web Services Applications

20 Jul 2012, Redpapers ... This IBM® Redpaper™ publication introduces the concept of a service-oriented architecture (SOA). The intended audience is web developers interested in SOA. It explains how to realize this type of an architecture using the following Java ...

Managing WebSphere Message Broker Resources in a Production Environment

26 Sep 2006, Redbooks ... This IBM Redbooks publication provides guidance on how to manage WebSphere Message Broker V6.0 and its resources in a production environment. It begins with an overview of the WebSphere Message Broker V6.0 architecture, components, and ...

Introduction to Storage Area Networks

22 Dec 2016, Redbooks ... The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and ...

IBM Hyper-Scale Manager for IBM Spectrum Accelerate Family: IBM XIV, IBM FlashSystem A9000 and A9000R, and IBM Spectrum Accelerate

31 Aug 2017, Redbooks ... This IBM® Redbooks® publication describes storage management functions and their configuration and usage with the IBM Hyper-Scale Manager management graphical user interface (GUI) for IBM FlashSystem® A9000 and A9000R, IBM XIV® Gen3, and ...

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe

26 Nov 2014, Redbooks ... Today, organizations engage with customers, business partners, and employees who are increasingly using mobile technology as their primary general-purpose computing platform. These organizations have an opportunity to fully embrace this ...

DFSMShsm Fast Replication Technical Guide

12 May 2015, Redbooks ... DFSMShsm fast replication provides DFSMShsm management for the use of volume-level fast replication. Fast replication is made possible by using the FlashCopy® capability of storage servers. With this capability, a set of storage groups can ...

Row and Column Access Support in IBM DB2 for i

14 Nov 2014, Redpapers ... This IBM® Redpaper™ publication provides information about the IBM i 7.2 feature of IBM DB2® for i Row and Column Access Control (RCAC). It offers a broad description of the function and advantages of controlling access to data in a ...

Configuring your Browser for trusted HTTPS Connections to IBM Content Navigator and Box

30 Jun 2017, Web Doc ... When integrating a Box repository with IBM® Content Navigator, it is necessary to connect to IBM Content Navigator and Box with a secure HTTPS ...

Assessing Hardware Failures on IBM PureData System for Analytics N2001, N2002, and N3001

29 Sep 2016, Web Doc ... This IBM Analytics Support Wed Doc describes possible hardware component failures on IBM PureData System for Analytics, their effect on the system, and its criticality and consequences if multiple components fail. This document also ...

Practical Migration from x86 to LinuxONE

5 Jan 2017, Redbooks ... LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. It ...

Deploying QuickPlace

19 May 2002, Redbooks ... Lotus QuickPlace is the leading self-service Web tool for team collaboration. With QuickPlace, teams can share a virtual workspace to communicate, collaborate, and coordinate. People can create and share documents and knowledge, discuss ...

What to Consider When Switching IBM InfoSphere Information Server to Use LDAP Authentication

18 Apr 2016, Web Doc ... When changing IBM® InfoSphere® Information Server to authenticate with Lightweight Directory Access Protocol (LDAP), consider several aspects before making the switch. This document discusses the two types of LDAP registries, what to ...

Securely Expose Business Assets and Fuel Innovation

26 Aug 2015, Point-of-View ... Cloud computing is an obvious technology option considered by many C-level executives. However, understanding when and how to use it can make all the difference when it comes to business success or catastrophic failure. The ...

IBM Enterprise Content Management Mobile Application Implementation

9 May 2016, Redpapers ... IBM® Enterprise Content Management (ECM) software enables the world's top companies to make better decisions, faster. By controlling content, companies can use industry-specific solutions to capture, manage, and share information. ...

IBM z13 for Mobile Applications

13 Jan 2015, Solution Guide ... In today’s mobile era, over 10 billion devices are accessing information. Enterprises are challenged with integrating new mobile services with existing organizational processes, without sacrificing the client’s experience. Approximately ...

Simplify Software Audits and Cut Costs by Using the IBM License Metric Tool

17 Sep 2014, Redpapers ... In this IBM® Redpaper™ publication, you learn how to implement the IBM subcapacity licensing functions and the IBM License Metric Tool to track and manage licenses for your IBM WebSphere® Application Server instances. It also summarizes ...

WebSphere Application Server: New Features in V8.5.5

28 May 2013, Redpapers ... IBM® WebSphere® Application Server helps drive business agility with an innovative, performance-based foundation to build, reuse, run, integrate, and manage service-oriented architecture (SOA) applications and services. From business ...

IBM TS2900 Tape Autoloader

20 Oct 2011, Product Guide ... IBM® TS2900 Tape Autoloader is a low-entry tape storage solution, designed to address capacity, data protection, reliability, availability, and affordability. See latest abstract here: ...

DFSMSrmm Primer

4 Sep 2014, Redbooks ... DFSMSrmm from IBM® is the full function tape management system available in IBM OS/390® and IBM z/OS®. With DFSMSrmm, you can manage all types of tape media at the shelf, volume, and data set level, simplifying the tasks of your tape ...

DB2 UDB Exploitation of the Windows Environment

4 Mar 2004, Redbooks ... Although roughly ninety percent of DB2 Universal Database (UDB) on distributed platforms is common code, IBM makes great efforts to exploit the features of each operating system to which it ports; and on Windows, this is no exception. ...

DB2 10 for z/OS Technical Overview

16 Jul 2014, Redbooks ... IBM® DB2® Version 10.1 for z/OS® (DB2 10 for z/OS or just DB2 10 throughout this book) is the fourteenth release of DB2 for MVS™. It brings improved performance and synergy with the System z® hardware and more opportunities to drive ...

Implementation of IBM j-type Ethernet Appliances

28 Feb 2011, Redbooks ... IBM® j-type data center solutions that run Junos software provide operational agility and efficiency that dramatically simplifies the network and delivers unprecedented savings. This solution enables a network design with fewer devices, ...

IBM Tivoli Storage Manager: Building a Secure Environment

27 Jun 2007, Redbooks ... Many people want to be famous, but nobody wants to hit the headlines in an incident resulting in the theft or misuse of their employees’ or clients’ confidential data. While the necessity of securing the confidentiality, integrity, and ...

z/OS Version 1 Release 2 Implementation

29 May 2002, Redbooks ... This IBM Redbooks publication highlights many new enhancements made in z/OS Version 1 Release 2. You can use this information to help you install, tailor, and configure z/OS Version 1 Release 2. It will give you an understanding of a new ...

Introduction to Grid Computing with Globus

5 Oct 2003, Redbooks ... This IBM Redbooks publication is intended to give readers interested in the technical aspects of grid computing a hands-on introduction using the Globus Toolkit. This includes a discussion of the first basics of grid computing, and various ...

Linux on IBM zSeries and S/390: Securing Linux for zSeries with a Central z/OS LDAP Server (RACF)

12 May 2004, Redpapers ... This IBM Redpaper provides information to help customers, Business Partners, and IBM technical people plan, implement and manage a central security solution for authentication and user information for multiple Linux systems using an LDAP ...

IBM i 6.1 Technical Overview

16 Dec 2009, Redbooks ... This IBM® Redbooks® publication introduces a technical overview of the main new features, functions and enhancements available in IBM i 6.1 (formerly called i5/OS® V6R1). It gives a summary and brief explanation of new capabilities and ...

Using MQSeries for VSE

26 Jan 2005, Redbooks ... This IBM Redbooks publication will help you get started with MQSeries for VSE V2R1.2. It explores why and how to use MQSeries with the VSE operating system and shows why MQSeries is more than just another queuing system. This book is meant ...

WebSphere Version 6 Web Services Handbook Development and Deployment

24 Jul 2005, Redbooks ... This IBM Redbooks publication describes the concepts of Web services from various perspectives. It presents the major building blocks on which Web services rely. Here, well-defined standards and new concepts are presented and ...

IBM WebSphere Everyplace Connection Manager Version 5 Handbook

28 Apr 2004, Redbooks ... This IBM Redbooks publication helps you plan and implement wireless solutions to access backend resources such as databases, application servers, and other legacy applications from wireless devices. This book deals with IBM WebSphere ...

Tivoli Identity Manager V4.5.1 Uninstall JVM Failure

24 Jul 2005, Web Doc ... JVM failure in the IBM® Tivoli® Identity Manager V4.5.1 uninstall ...

Lotus Domino 6 for Linux

10 Dec 2002, Redbooks ... This IBM Redbooks publication describes how to run the IBM Lotus Domino 6 server on the Linux platform. While Lotus Domino 6 is platform-independent, some specific knowledge about the platform and configuration is required to ensure that ...

z/OS Identity Propagation

28 Sep 2011, Redbooks ... This IBM® Redbooks® publication explores various implementations of z/OS® Identity Propagation where the distributed identity of an end user is passed to z/OS and used to map to a RACF® user ID, and any related events in the audit trail ...

ABCs of z/OS System Programming: Volume 4

9 Feb 2011, Redbooks ... This IBM® Redbooks® publication describes the functions of z/OS® Communications Server. z/OS Communications Server provides a set of communications protocols that support peer-to-peer connectivity functions for both local and wide-area ...

Communications Server for z/OS V1R9 TCP/IP Implementation Volume 2: Standard Applications

2 Sep 2008, Redbooks ... The Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand, step-by-step guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. In this IBM Redbooks publication we ...

IBM System z Strengths and Values

12 May 2008, Redbooks ... This IBM Redbooks publication describes the strengths and values of the IBM System z platform with special focus on IBM z/OS. Other System z operating systems are described briefly in relation to the values that customers can obtain from ...

z/OS: WebSphere Business Process Management V6.1.2 Production Topologies

27 Jan 2009, Redbooks ... This IBM Redbooks publication describes how to choose and configure a production topology for WebSphere Process Server for z/OS and WebSphere Business Services Fabric for z/OS . This paper book will be useful to infrastructure architects ...

Information Governance Principles and Practices for a Big Data Landscape

31 Mar 2014, Redbooks ... This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape. As organizations embark on new use ...

Production Topologies for WebSphere Process Server and WebSphere ESB V6

19 Apr 2007, Redbooks ... WebSphere Process Server and WebSphere ESB are highly available and scalable products for running enterprise-level SOA solutions. But does every production topology that uses these products follow the same basic pattern? This book answers ...

IBM WebSphere DataPower SOA Appliances Part II: Authentication and Authorization

1 Apr 2008, Redpapers ... IBM® WebSphere® DataPower® SOA Appliances represent an important element in the holistic approach of IBM to service-oriented architecture (SOA). IBM SOA appliances are purpose-built, easy-to-deploy network devices that simplify, secure, ...


Search Tips



To perform a simple search, type one or more terms in the search box and click the Search button. The search function returns a list of Web pages that contains your terms. During this process, search finds singular and plural forms of many words and corrects minor misspellings.The search function is not case sensitive.

The most relevant pages display at the top of your results list. Alternatively, you can sort results "by Publish Date."

Take the following actions to make your search more effective:

  • Be specific. Try using terms that are unique or try adding descriptive terms. For example, a search for DB2 might return too many results. If you are really looking for DB2 UDB, enter db2 udb or db2 udb linux.
  • Try using synonyms. If you get too few results or do not find what you are looking for, try synonyms for your original terms.
  • Check your spelling. A single misspelled or mistyped term can change your results.
  • Learn from your results. Your search might not return exactly what you are looking for, but scanning the results can help you see the words that were found and give you ideas for other searches.

Improving your search terms

Most of the time, a simple search finds relevant results. The following search operators help you to refine your search.

Exact phrase searches

Add double quotation marks (" ") around specific phrases to focus your search on the exact phrase. A phrase search can greatly reduce the number of results. For example, enter:

"hybrid cloud"

The results contain pages that have the exact phrase hybrid cloud in them.

Adding double quotation marks around your search words also prevents spelling corrections.


Excluding terms

Include a minus sign (-) at the beginning of a term to exclude all the pages with that term. Do not leave any space between the minus sign and the term, but leave a space between search terms. For example, enter:

POWER8 -virtualization

The results contain pages with POWER8 but not the word virtualization.


Exact terms

The IBM search function automatically searches for synonyms of many terms. Include a plus sign (+) at the beginning of a term to require that the results match the term precisely. Do not leave any space between the plus sign and the term, but leave a space between search terms. For example, if you want to search for z/OS workshop and not z/OS training, enter:

z/OS +workshop

The results contain pages with z/OS and workshop, and synonyms for workshop are not used.


Expanding your search with the OR operator

Use the OR operator between terms to indicate that you want the results to contain either one of several terms. You must type OR in capital letters. For example, enter:

storwize v7000 OR v3500

The results contain pages that have storwize v7000 or storwize v3500.

IBM Redbooks Mobile App
Redbooks mobile app

The newest version of the official IBM Redbooks mobile app provides automated notifications for new and updated Redbooks content that is specifically tailored to your interests.


Follow IBM Redbooks

Follow IBM Redbooks