Skip to main content

IBM Security Redbooks

 

Detect, prioritize, address,
and help prevent security breaches

 
test

23 February 2024

IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment

Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration …

Read now
test

25 April 2023

Security Implementation with Red Hat OpenShift on IBM Power Systems

Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any …

Read now
test

14 April 2022

IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i …

Read now


IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment

23 February 2024, Redbooks

Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies ...


Security Implementation with Red Hat OpenShift on IBM Power Systems

25 April 2023, Redpaper

Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and ...


IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

14 April 2022, Redpaper

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM ...


Multi-Factor Authentication Using IBM Security Verify for IBM Spectrum Fusion

21 December 2021, Redpaper

Data is the new crown jewel of any organization. The use of Multi-Factor Authentication (MFA) to safeguard the most critical asset of any organization (the data) became a high-priority need. MFA verifies the identity of the consumers by applying multiple methods that provide an extra layer of security in addition to the login credentials. Regulatory compliances exist that require MFA, such as ...


Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution

13 September 2021, Redpaper

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of ...


IBM Security Guardium Key Lifecycle Manager

02 August 2021, Redbooks

This IBM® Redbooks® publication describes the installation, integration, and configuration of IBM Security Guardium® Key Lifecycle Manager.


Securing Data in the IBM Garage

24 March 2021, Video

In this video IBM firewall specialist Aaron Lewis explains how the IBM Garage secures the data of their clients.


Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway

20 November 2020, Redpaper

In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find ...


Maximizing Security with LinuxONE

10 August 2020, Redpaper

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad ...


Experiences Installing Firepower Services on an ASA5525X Technical Enablement Series

07 October 2019, Redpaper

This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on ...

 
1–10 of 23 items
of 3 pages