Results per page:
IBM QRadar Version 7.3 Planning and Installation Guide
Security
Redbooks, published 4 Jan 2018
With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: ... [more]
Leveraging Integrated Cryptographic Service Facility
Security
Redpaper, published 3 Jan 2018
Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM Redpaper™ publication briefly describes ICSF and the key elements of z/OS that address different security ... [more]
Zero to Blockchain
Security
Course, published 17 Nov 2017
Learn how to develop blockchain solutions using Hyperledger Composer on Hyperledger Fabric Version 1.0+. This 15 chapter tutorial takes you from no experience to building a complete blockchain application.
z/OS PKI Services: Quick Set-up for Multiple CAs
Security
Redbooks, published 20 Sep 2016, last updated 20 Jan 2017
If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]
IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security
Redpaper, published 23 Dec 2016
What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]
The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.