Results per page:
Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway
Cloud
Redpaper, published 20 Nov 2020
In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find themselves using individual dashboards for each of the cloud providers to monitor and manage those environments. In turn, each of the cloud provider’s dashboards have their own unique features that ... [more]
Maximizing Security with LinuxONE
LinuxONE
Redpaper, published 10 Aug 2020
LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples:
- Hardware accelerated ... [more]
Securing Data on Threat Detection Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Storage Solutions
Redpaper, published 18 May 2020
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to ... [more]
Experiences Installing Firepower Services on an ASA5525X Technical Enablement Series
Security
Redpaper, published 7 Oct 2019
This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on an ASA 5525-X running code level 9.6.2 from the Command Line Interface (CLI). We do not discuss the ASDM installation method. This document addresses the needs of Network Administrators, Security ... [more]
Security in Development: The IBM Secure Engineering Framework
Security
Redguide, published 17 Dec 2018
IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to ... [more]
The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.