Skip to main content

End to End Security with z Systems

An IBM Redpaper publication

thumbnail 

Published on 03 April 2015

  1. .EPUB (0.5 MB)
  2. .PDF (0.8 MB)

Apple BooksGoogle Play BooksRead in Google Books
Share this page:   

ISBN-10: 0738454192
ISBN-13: 9780738454191
IBM Form #: REDP-5153-00


Authors: Lydia Parziale and Willian Rampazzo

    menu icon

    Abstract

    This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

    The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Security Overview

    Chapter 3. Use case

     

    Others who read this also read