Skip to main content

Ultimate Security with the IBM z13

Web Doc

thumbnail 

Published on 14 January 2015, updated 13 February 2015

  1. View in HTML
  2. .PDF (1.0 MB)

Share this page:   

IBM Form #: TIPS1257


Authors: Lydia Parziale

menu icon

Abstract

There are benefits to using the IBM® z13™ cryptographic hardware. It supports the use of Central Processor Assist for Cryptographic Functions (CPACF) and Crypto Express5S through in-kernel crypto APIs and the libica cryptographic functions library. Here are the benefits of these features:

* File system encryption

* Communication encryption (to applications such as IBM HTTP Server)

* System security by providing advanced cryptographic functions

This IBM Redbooks® Solution Guide explains how the IBM z13 can help your organization maintain the highest level of security that is possible.

Contents

Analytics, mobile, social, and cloud computing all have one thing in common: They need a platform that has a deeply integrated security stack. This is where IBM® z Systems™ excel. To help counter the many threats to your business in the current world, including hackers looking to penetrate your systems and government-backed attacks, z Systems offers a platform with layers of defense to protect your customer data, intellectual property, and your reputation.

You can no longer just wrap security around the system; you must build security into the system. The IBM z13™ is a new system that is designed for analytics, mobile, social, and cloud computing with built-in security.

Using the z13 cryptographic hardware, you gain security from using the Central Processor Assist for Cryptographic Functions (CPACF) and Crypto Express5S through in-kernel cryptography APIs and, for Linux on z Systems, the libica cryptographic functions library.

The benefits of using these features are:

 

Others who read this also read

Special Notices

The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.