Showing documents 1 to 10 of 116  Next

Results per page: 5 | 10 | 20


cover image

Developing a Blockchain Business Network with Hyperledger Composer using the IBM Blockchain Platform Starter Plan
Security

Redpaper, published 11 May 2018, last updated 30 May 2018

Blockchain has emerged as a disruptive technology in the areas of trading assets and sharing information. It has the capability to transform many industries, professions, and aspects of life. The focus of this IBM® Redbooks® publication is to help developers build blockchain solutions and use IBM Blockchain Platform to start, test, and move applications into production. This publication covers some blockchain for business use cases. It also describes how to get started in defining, developing, and deploying a Hyperledger Composer business network to Hyperledger Fabric, both locally on a ... [more]


cover image

Protecting the VMware Environment with IBM Spectrum Protect
Spectrum Computing

Redpaper, published 25 Dec 2017, last updated 8 Jan 2018

While backup is a topic of much discussion, development, and strategy, the name of the game is rapid recovery. Given the explosive growth of data in our Client environments, there is a need to provide solutions to our Clients that meet their recovery time objective and recovery point objective needs. Traditional backups of files, databases, and similar objects sent across networks (LAN or SAN) to backup servers provide a degree of recoverability, but the speed of backup and recovery is constrained by resource capacity (server, network, storage, and so on). This results in longer backup and ... [more]


cover image

Security and Linux on z Systems
z Systems

Redpaper, published 18 Dec 2017, last updated 8 Jan 2018

This IBM® Redpaper™ publication discusses security practices for running Linux on z Systems on the IBM z14. It examines the unique security and integrity features that the IBM Z platform brings to the enterprise. It also examines pervasive encryption and its role in protecting data at rest.


cover image

IBM QRadar Version 7.3 Planning and Installation Guide
Security

Redbooks, published 4 Jan 2018

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: ... [more]


cover image

Leveraging Integrated Cryptographic Service Facility
Security

Redpaper, published 3 Jan 2018

Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM Redpaper™ publication briefly describes ICSF and the key elements of z/OS that address different security ... [more]


cover image

Zero to Blockchain
Security

Course, published 17 Nov 2017

Learn how to develop blockchain solutions using Hyperledger Composer on Hyperledger Fabric Version 1.0+. This 15 chapter tutorial takes you from no experience to building a complete blockchain application.


cover image

IBM Spectrum Scale Security
Security

Redpaper, published 25 Jan 2017

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental ... [more]


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


cover image

IBM BigInsights Security Implementation Part 2: Securing the IBM BigInsights Cluster Perimeter
Analytics

Web Doc, published 9 Dec 2016

Big data analytics is network intensive because it runs on a cluster of nodes. Due to the high volumes of data exchanged between nodes in the IBM® BigInsights® cluster, network isolation is vital for the following reasons:
- To prevent sniffing attacks
- To reduce the network congestion so that the corporate network is not affected by the big data cluster traffic
Isolating the cluster network also gives administrators greater flexibility in enforcing the cluster access. This IBM® Redbooks® Analytics Support web doc serves as a guide for system implementers who are ... [more]


The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. Most of these publications are available in Adobe PDF format and may be viewed online or downloaded for offline viewing and printing. Read our How to buy page for details on how to order a bound hardcopy.



Follow IBM Redbooks

Follow IBM Redbooks