06 December 2024
IT security is paramount in today’s digital age. As businesses increasingly rely on technology to operate, protecting sensitive data and preventing cyberattacks becomes a top priority. Cloud adoption introduces additional security risks, including …
29 July 2024
Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing …
23 February 2024
Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, …
06 December 2024, Draft Redbooks
IT security is paramount in today's digital age. As businesses increasingly rely on technology to operate, protecting sensitive data and preventing cyberattacks becomes a top priority. Cloud adoption introduces additional security risks, including data breaches and loss of access. A strong IT security infrastructure safeguards customer information, financial data, intellectual property, and ...
29 July 2024, Redpaper
Because of the financial impacts and brand reputation damage that can result from cyberattacks on your business, modernization of your z/TPF environment must be done with security at the forefront. This Redbook provides information about securing and enhancing the cybersecurity features of your z/TPF systems, ensuring both current and future needs are met.
23 February 2024, Redbooks
Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust ...
25 April 2023, Redpaper
Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and ...
14 April 2022, Redpaper
This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM ...
13 September 2021, Redpaper
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of ...
20 November 2020, Redpaper
In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find ...
17 December 2018, Redpaper
IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing ...
24 August 2018, Redbooks
This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital ...
30 May 2018, Redpaper
Blockchain has emerged as a disruptive technology in the areas of trading assets and sharing information. It has the capability to transform many industries, professions, and aspects of life. The focus of this IBM® Redbooks® publication is to help developers build blockchain solutions and use IBM Blockchain Platform to start, test, and move applications into production. This publication covers ...
Most popular publications by monthly downloads.
IBM Redbooks are developed through a unique program - the Residency - that teams IBM technical professionals with Business Partners, clients, and IBM product development staff. Depending on the market needs of a product or solution, a team of residents is chosen through a competitive nomination process and collaborates for two to eight weeks on developing IBM Redbooks. Would you like to join a team writing IBM Redbooks? Find an upcoming residency from the list below and submit a nomination!