Skip to main content

Getting Started with IBM Z Cyber Vault

An IBM Redbooks publication


Published on 18 November 2021, updated 29 November 2021

  1. .EPUB (2.6 MB)
  2. .PDF (5.3 MB)

Share this page:   

ISBN-10: 0738460117
ISBN-13: 9780738460116
IBM Form #: SG24-8511-00

Authors: Bill White, Matthias Bangert, Cyril Armand, Roger Bales, Diego Bessone, Anthony Ciabattoni, Michael Frankenberg, Debra Hallen, DeWayne Hughes, Vinod Kanwal, Karen Smolar, Jean-Marc Vandon, Paolo Vitali and Knud Vraa

    menu icon


    With cyberattacks on the raise, cyber resiliency is becoming more important than ever. Cyber resiliency can provide the required capability against cyberattacks and prevent significant impact if the attacks are detected early. A cybersecurity strategy might minimize the risk of attacks getting through to systems, applications, and data, but a cyber resiliency strategy is needed to minimize the impact of a cyberattack by recovering quickly. Preparing for, responding to, and recovering from a cyberattack is not something that just happens, but must be thoroughly designed, planned for, and tested.

    This IBM® Redbooks® publication looks at some common cyberthreats and introduces a cyber resiliency solution that is called IBM Z® Cyber Vault. This book describes the technology and cyber resiliency capabilities of the solution at various hardware, software, and operational levels, and describes what to consider when pursuing higher cyber resiliency goals.

    Guidance and step-by-step examples for the deployment of IBM Z Cyber Vault are also included, and a suggested framework with advice for conducting basic data validation and samples that can be tailored to individual business needs, priorities, and IT configurations.

    This publication is intended for IT managers, line of business (LOB) managers, IT architects, system programmers, storage administrators, security administrators, database administrators (DBAs), and system operations professionals.

    Table of Contents

    Chapter 1. Protecting against key cyberthreats

    Chapter 2. Planning and designing the IBM Z Cyber Vault environment

    Chapter 3. Deploying the IBM Z Cyber Vault environment

    Chapter 4. Establishing a validation framework


    Others who read this also read