Showing documents 1 to 20 of 22  Next

Results per page: 5 | 10 | 20


cover image

IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment
Security

Redbooks, published 23 Feb 2024

Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. A state of least privilege ensures that no user or workload has any more access to data than ... [more]


cover image

Security Implementation with Red Hat OpenShift on IBM Power Systems
Power Systems

Redpaper, published 25 Apr 2023

Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and monitoring to ensure the continued security of the environment. This IBM® Redpaper publication provides a comprehensive overview of the security best practices for deploying Red Hat OpenShift on IBM Power. It ... [more]


cover image

IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers
Power Systems

Redpaper, published 14 Apr 2022

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC, makes IBM a premier security vendor in the market today. In this book, we explore, test, and document ... [more]


cover image

Multi-Factor Authentication Using IBM Security Verify for IBM Spectrum Fusion
Security

Redpaper, published 21 Dec 2021

Data is the new crown jewel of any organization. The use of Multi-Factor Authentication (MFA) to safeguard the most critical asset of any organization (the data) became a high-priority need. MFA verifies the identity of the consumers by applying multiple methods that provide an extra layer of security in addition to the login credentials. Regulatory compliances exist that require MFA, such as PCI DSS v3.2, NIST SP 800-171, and DFS 23 NYCRR 500. Implementation of MFA reduces the risk and increases the security posture of your deployments. Storage is where the data resides. Compute is where ... [more]


cover image

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Storage solutions

Redpaper, published 13 Sep 2021

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to ... [more]


cover image

IBM Security Guardium Key Lifecycle Manager
Security

Redbooks, published 2 Aug 2021

This IBM® Redbooks® publication describes the installation, integration, and configuration of IBM Security Guardium® Key Lifecycle Manager.


cover image

Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway
IBM Cloud Paks

Redpaper, published 20 Nov 2020

In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find themselves using individual dashboards for each of the cloud providers to monitor and manage those environments. In turn, each of the cloud provider’s dashboards have their own unique features that ... [more]


cover image

Maximizing Security with LinuxONE
LinuxONE

Redpaper, published 10 Aug 2020

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples:
- Hardware accelerated ... [more]


cover image

Experiences Installing Firepower Services on an ASA5525X Technical Enablement Series
Security

Redpaper, published 7 Oct 2019

This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on an ASA 5525-X running code level 9.6.2 from the Command Line Interface (CLI). We do not discuss the ASDM installation method. This document addresses the needs of Network Administrators, Security ... [more]


cover image

Security in Development: The IBM Secure Engineering Framework
Security

Redpaper, published 17 Dec 2018

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to ... [more]


cover image

IBM Spectrum Scale Security
Security

Redpaper, published 18 Sep 2018

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental ... [more]


cover image

Managing Digital Certificates across the Enterprise
IBM Z

Redbooks, published 11 Feb 2016, last updated 24 Aug 2018

This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital certificates overview” on page 1 provides an overview of digital certificates. It describes their purpose, gives a high-level overview of how they are created and their relationship to keys and encryption, and ... [more]


cover image

Developing a Blockchain Business Network with Hyperledger Composer using the IBM Blockchain Platform Starter Plan
Security

Redpaper, published 11 May 2018, last updated 30 May 2018

Blockchain has emerged as a disruptive technology in the areas of trading assets and sharing information. It has the capability to transform many industries, professions, and aspects of life. The focus of this IBM® Redbooks® publication is to help developers build blockchain solutions and use IBM Blockchain Platform to start, test, and move applications into production. This publication covers some blockchain for business use cases. It also describes how to get started in defining, developing, and deploying a Hyperledger Composer business network to Hyperledger Fabric, both locally on a ... [more]


cover image

Protecting the VMware Environment with IBM Spectrum Protect
Storage solutions

Redpaper, published 25 Dec 2017, last updated 8 Jan 2018

While backup is a topic of much discussion, development, and strategy, the name of the game is rapid recovery. Given the explosive growth of data in our Client environments, there is a need to provide solutions to our Clients that meet their recovery time objective and recovery point objective needs. Traditional backups of files, databases, and similar objects sent across networks (LAN or SAN) to backup servers provide a degree of recoverability, but the speed of backup and recovery is constrained by resource capacity (server, network, storage, and so on). This results in longer backup and ... [more]


cover image

Security and Linux on z Systems
IBM Z

Redpaper, published 18 Dec 2017, last updated 8 Jan 2018

This IBM® Redpaper™ publication discusses security practices for running Linux on z Systems on the IBM z14. It examines the unique security and integrity features that the IBM Z platform brings to the enterprise. It also examines pervasive encryption and its role in protecting data at rest.


cover image

IBM QRadar Version 7.3 Planning and Installation Guide
Security

Redbooks, published 4 Jan 2018

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: ... [more]


cover image

Leveraging Integrated Cryptographic Service Facility
Security

Redpaper, published 3 Jan 2018

Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM Redpaper™ publication briefly describes ICSF and the key elements of z/OS that address different security ... [more]


cover image

Zero to Blockchain
Security

Course, published 17 Nov 2017

Learn how to develop blockchain solutions using Hyperledger Composer on Hyperledger Fabric Version 1.0+. This 15 chapter tutorial takes you from no experience to building a complete blockchain application.


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


 Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks