Showing documents 1 to 5 of 20  Next

Results per page: 5 | 10 | 20


cover image

IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers
Power Systems

Redpaper, published 14 Apr 2022

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC, makes IBM a premier security vendor in the market today. In this book, we explore, test, and document ... [more]


cover image

Multi-Factor Authentication Using IBM Security Verify for IBM Spectrum Fusion
Security

Redpaper, published 21 Dec 2021

Data is the new crown jewel of any organization. The use of Multi-Factor Authentication (MFA) to safeguard the most critical asset of any organization (the data) became a high-priority need. MFA verifies the identity of the consumers by applying multiple methods that provide an extra layer of security in addition to the login credentials. Regulatory compliances exist that require MFA, such as PCI DSS v3.2, NIST SP 800-171, and DFS 23 NYCRR 500. Implementation of MFA reduces the risk and increases the security posture of your deployments. Storage is where the data resides. Compute is where ... [more]


cover image

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution
Storage Solutions

Redpaper, published 13 Sep 2021

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to ... [more]


cover image

IBM Security Guardium Key Lifecycle Manager
Security

Redbooks, published 2 Aug 2021

This IBM® Redbooks® publication describes the installation, integration, and configuration of IBM Security Guardium® Key Lifecycle Manager.


cover image

Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway
IBM Cloud Paks

Redpaper, published 20 Nov 2020

In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find themselves using individual dashboards for each of the cloud providers to monitor and manage those environments. In turn, each of the cloud provider’s dashboards have their own unique features that ... [more]


 Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks