Skip to main content

Securing Your Mobile Mainframe

An IBM Redpaper publication

thumbnail 

Published on 29 December 2015

  1. .PDF (1.9 MB)

Share this page:   

ISBN-10: 0738454885
ISBN-13: 9780738454887
IBM Form #: REDP-5176-01


Authors: Mild Wilhelm , Martina von dem Bussche and Robert L. Kennedy

    menu icon

    Abstract

    To achieve business goals today, Systems of Record (SoR) that are serving transactional and data services must interface with Systems of Engagement (SoE) that are increasingly represented by mobile devices. System security and integrity is an IBM commitment and a focus for this Point of View.

    This document is for businesses that are interested in end-to-end security from the mobile device to the transactional end point.

    The following critical topics are covered:

    - Secured mobile transaction challenges

    - The mainframe as the backbone for secure mobile workloads

    - The four pillars of security

    - End-to-end security for a typical mobile application

    - Customer examples

    Table of Contents

    Security challenges evolve, and so does the security environment with IBM z Systems

    Mobile is changing mainframe security challenges

    Why the mainframe is the backbone for secure mobile workloads

    What's next: How IBM can help

     

    Others who read this also read