Getting Started with IBM Hyper Protect Data Controller

An IBM Redbooks publication

thumbnail 

Published on January 03, 2022, updated January 04, 2022

  1. .EPUB (3.0 MB)
  2. .PDF (4.3 MB)

Apple BooksGoogle Play Books
Share this page:   

ISBN-10: 0738460036
ISBN-13: 9780738460031
IBM Form #: SG24-8495-00


Authors: Bill White, Andy Coulson, Guillaume Hoareau, Jason Katonica, Roy Panting, Philippe Richard, Maxwell Weiss and Eva Yan

    menu icon

    Abstract

    IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes—security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record.

    This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics:

    • Concepts and reference architecture
    • Common use cases with implementation guidance and advice
    • Implementation and policy examples
    • Typical operational tasks for creating policies and preparing for audits
    • Monitoring user activity and events

    This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers.

    Table of Contents

    Chapter 1. Introducing IBM Hyper Protect Data Controller

    Chapter 2. Using Hyper Protect Data Controller

    Chapter 3. Getting started with deploying Hyper Protect Data Controller

    Chapter 4. Sizing the environment

    Chapter 5. Use case implementation examples

    Chapter 6. Operations

    Chapter 7. Diagnostics, logging, and monitoring

    Appendix A. Transport Layer Security setups for z/OS LDAP server

    Appendix B. Managing certificates with Hyper Protect Data Controller

    Appendix C. Example Hyper Protect Data Controller policy

     

    Others who read this also read