Skip to main content

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

An IBM Redbooks publication

thumbnail 

Published on 25 September 2015

  1. .EPUB (1.9 MB)
  2. .PDF (8.5 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738440949
ISBN-13: 9780738440941
IBM Form #: SG24-8195-00


Authors: Axel Buecker, Thomas Cosenza, Uma Kumaraguru, Christopher Meyer, Vinicius Oliveira, Vinodkumar Ramalingam, Jan Thielmann and Joe Welsh

    menu icon

    Abstract

    This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today’s business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

    We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

    This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

    Table of Contents

    Chapter 1. Mainframe network concepts and functions

    Chapter 2. Cryptography for network security

    Chapter 3. TCP/IP security

    Chapter 4. SNA security

    Chapter 5. Shared Memory Communications over RDMA

     

    Others who read this also read