Showing documents 6 to 10 of 20  Previous  Next

Results per page: 5 | 10 | 20


cover image

Maximizing Security with LinuxONE
LinuxONE

Redpaper, published 10 Aug 2020

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples:
- Hardware accelerated ... [more]


cover image

Experiences Installing Firepower Services on an ASA5525X Technical Enablement Series
Security

Redpaper, published 7 Oct 2019

This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on an ASA 5525-X running code level 9.6.2 from the Command Line Interface (CLI). We do not discuss the ASDM installation method. This document addresses the needs of Network Administrators, Security ... [more]


cover image

Security in Development: The IBM Secure Engineering Framework
Security

Redpaper, published 17 Dec 2018

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to ... [more]


cover image

IBM Spectrum Scale Security
Security

Redpaper, published 18 Sep 2018

Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental ... [more]


cover image

Managing Digital Certificates across the Enterprise
IBM Z

Redbooks, published 11 Feb 2016, last updated 24 Aug 2018

This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital certificates overview” on page 1 provides an overview of digital certificates. It describes their purpose, gives a high-level overview of how they are created and their relationship to keys and encryption, and ... [more]


 Previous  Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks