Getting Started with IBM Z Cyber Vault

An IBM Redbooks publication

Published 18 November 2021

cover image

ISBN-10: 0738460117
ISBN-13: 9780738460116
IBM Form #: SG24-8511-00
(164 pages)

More options

Rate and comment

Authors: Bill White, Matthias Bangert, Cyril Armand, Roger Bales, Diego Bessone, Anthony Ciabattoni, Michael Frankenberg, Debra Hallen, DeWayne Hughes, Vinod Kanwal, Karen Smolar, Jean-Marc Vandon, Paolo Vitali, Knud Vraa

Abstract

With cyberattacks on the raise, cyber resiliency is becoming more important than ever. Cyber resiliency can provide the required capability against cyberattacks and prevent significant impact if the attacks are detected early. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to minimize the impact of a cyberattack by recovering quickly. Preparing for, responding to, and recovering from a cyberattack is not something that just happens, but must be thoroughly designed, planned for, and tested.

This IBM® Redbooks® publication looks at some common cyberthreats and introduces a cyber resiliency solution that is called IBM Z® Cyber Vault. This book describes the technology and cyber resiliency capabilities of the solution at various hardware, software, and operational levels, and describes what to consider when pursuing higher cyber resiliency goals.

Guidance and step-by-step examples for the deployment of IBM Z Cyber Vault are also included, and a suggested framework with advice for conducting basic data validation and samples that can be tailored to individual business needs, priorities, and IT configurations.

This publication is intended for IT managers, line of business (LOB) managers, IT architects, system programmers, storage administrators, security administrators, database administrators (DBAs), and system operations professionals.

Table of contents

Chapter 1. Protecting against key cyberthreats
Chapter 2. Planning and designing the IBM Z Cyber Vault environment
Chapter 3. Deploying the IBM Z Cyber Vault environment
Chapter 4. Establishing a validation framework

Follow IBM Redbooks

Follow IBM Redbooks