
15 April 2025
IT security is paramount in today’s digital age. As businesses increasingly rely on technology to operate, protecting sensitive data and preventing cyberattacks is a priority. Cloud adoption introduces more security risks, which include data …

29 July 2024
Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing …

23 February 2024
Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, …
15 April 2025, Redbooks
IT security is paramount in today's digital age. As businesses increasingly rely on technology to operate, protecting sensitive data and preventing cyberattacks is a priority. Cloud adoption introduces more security risks, which include data breaches and loss of access. A strong IT security infrastructure safeguards customer information, financial data, intellectual property, and overall business ...
29 July 2024, Redpaper
Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing and enhancing the cybersecurity features of your z/TPF systems, ensuring both current and future needs are met.
23 February 2024, Redbooks
Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust ...
25 April 2023, Redpaper
Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and ...
14 April 2022, Redpaper
This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM ...
13 September 2021, Redpaper
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of ...
20 November 2020, Redpaper
In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find ...
17 December 2018, Redpaper
IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing ...
24 August 2018, Redbooks
This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital ...
30 May 2018, Redpaper
Blockchain has emerged as a disruptive technology in the areas of trading assets and sharing information. It has the capability to transform many industries, professions, and aspects of life. The focus of this IBM® Redbooks® publication is to help developers build blockchain solutions and use IBM Blockchain Platform to start, test, and move applications into production. This publication covers ...
Most popular publications by monthly downloads.
1194 downloads last month, last updated 15 April 2025
1134 downloads last month, last updated 25 April 2023
642 downloads last month, last updated 17 December 2018
582 downloads last month, last updated 23 February 2024
401 downloads last month, last updated 14 April 2022
215 downloads last month, last updated 08 January 2018
215 downloads last month, last updated 04 January 2018
197 downloads last month, last updated 13 September 2021
179 downloads last month, last updated 30 May 2018
172 downloads last month, last updated 09 March 2016
IBM Redbooks are developed through a unique program - the Residency - that teams IBM technical professionals with Business Partners, clients, and IBM product development staff. Depending on the market needs of a product or solution, a team of residents is chosen through a competitive nomination process and collaborates for two to eight weeks on developing IBM Redbooks. Would you like to join a team writing IBM Redbooks? Find an upcoming residency from the list below and submit a nomination!