EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book IBM XIV Security with Data at Rest Encryption

Download or read book IBM XIV Security with Data at Rest Encryption written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2014-08-11 with total page 74 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting "data at rest" is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. As with all of its features, the IBM® XIV® Storage System provides data-at-rest encryption at no charge. This gives clients the opportunity to take advantage of encryption and still enjoy the lower total cost of ownership that XIV offers. This IBM RedpaperTM publication explains the architecture and design of the XIV encryption solution and how it must be configured and implemented. It can help clients and Storage Administrators who want to enable data encryption on XIV storage systems.

Book Data at rest Encryption for the IBM Spectrum Accelerate Family

Download or read book Data at rest Encryption for the IBM Spectrum Accelerate Family written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2019-04-05 with total page 130 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting data-at-rest is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. The IBM® Spectrum Accelerate family, which includes IBM XIV® Storage System, IBM FlashSystem® A9000, IBM FlashSystem A9000R system(s), and IBM SpectrumTM Accelerate Software provides data-at-rest encryption at no charge. Clients can take advantage of encryption and still benefit from the lower total cost of ownership (TCO) that the IBM Spectrum AccelerateTM family offers. For IBM FlashSystem A9000 and A9000R, clients now have a choice between an external key manager-based implementation or a local key based encryption implementation. The local key solution offers a simplified deployment of data-at-rest encryption. This IBM RedpaperTM publication explains the architecture and design of the XIV and IBM FlashSystem A9000 and A9000R encryption solutions. Details are provided for configuring and implementing both solutions.

Book IBM System Storage Solutions Handbook

Download or read book IBM System Storage Solutions Handbook written by Ezgi Coskun and published by IBM Redbooks. This book was released on 2016-07-15 with total page 288 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth, greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM SpectrumTM family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud. This IBM Redbooks® publication provides overviews and information about the most current IBM System Storage products. It shows how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM storage products can help you store, safeguard, retrieve, and share your data. This book is intended as a reference for basic and comprehensive information about the IBM Storage products portfolio. It provides a starting point for establishing your own enterprise storage environment. This book describes the IBM Storage products as of March, 2016.

Book XIV Storage System Product Guide

Download or read book XIV Storage System Product Guide written by Bert Dufrasne and published by IBM Redbooks. This book was released on 2016-01-05 with total page 24 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM XIV Storage System is a high-end flash optimized, fully scalable enterprise disk storage system that is based on a grid of standard hardware components. The architecture of the system is designed to deliver out-of-the box performance and ease of management while harnessing the high capacity and cost benefits of serial-attached SCSI (SAS) drives. The XIV Gen3 systems (and the Model 314 in particular) offer powerful real-time compression that is based on the IBM Random Access Compression Engine (RACE) technology. This IBM Redbooks Product Guide offers a brief overview of the IBM XIV Gen3 Storage System hardware and software features.

Book Getting Started with Linux on Z Encryption for Data At Rest

Download or read book Getting Started with Linux on Z Encryption for Data At Rest written by Bill White and published by IBM Redbooks. This book was released on 2019-04-08 with total page 120 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Book IBM System i Security  Protecting i5 OS Data with Encryption

Download or read book IBM System i Security Protecting i5 OS Data with Encryption written by Yessong Johng and published by IBM Redbooks. This book was released on 2008-07-24 with total page 308 pages. Available in PDF, EPUB and Kindle. Book excerpt: Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.

Book IBM XIV Storage System Architecture and Implementation

Download or read book IBM XIV Storage System Architecture and Implementation written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2017-11-03 with total page 488 pages. Available in PDF, EPUB and Kindle. Book excerpt: Not a new version - included warning for self signed X509 certificates - see section 5.2 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL). In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.

Book IBM XIV Storage System Business Continuity Functions

Download or read book IBM XIV Storage System Business Continuity Functions written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2018-08-07 with total page 442 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM XIV® Storage System has a rich set of copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and online backup solutions. These functions allow point-in-time copies, known as snapshots and full volume copies, and also include remote copy capabilities in either synchronous or asynchronous mode. A three-site mirroring function is now available to further improve availability and disaster recovery capabilities. These functions are included in the XIV software and all their features are available at no extra charge. The various copy functions are reviewed in separate chapters, which include detailed information about usage and practical illustrations. The book also illustrates the use of IBM® Tivoli® Storage Productivity Center for Replication to manage XIV Copy Services. This IBM Redbooks® publication is intended for anyone who needs a detailed and practical understanding of the XIV copy functions.

Book IBM Hyper Scale in XIV Storage

Download or read book IBM Hyper Scale in XIV Storage written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2014-11-24 with total page 106 pages. Available in PDF, EPUB and Kindle. Book excerpt: Organizations are struggling with an unprecedented surge in data, both user-created and machine-created. With an increasing reliance on this rapidly growing data, effective scaling of data storage represents a key challenge for all enterprises. IBM® Hyper-Scale helps you easily overcome provisioning scenarios that normally challenge traditional systems. IBM Hyper-Scale can accommodate several critical client scenarios for centralized administration, data mobility, load balancing, over-provisioning, and storage system repurposing. IBM Hyper-Scale introduces the following major concepts and technologies, with the IBM XIV® Storage System (Gen3 models): IBM Hyper-Scale Manager is a flexible, consolidated multi-system management application that builds upon the originally released Multi-System Manager with XIV Storage Software V11.2. IBM Hyper-Scale Manager is based on, and seamlessly integrated with, the XIV graphical user interface (GUI) and spans multiple XIV systems. It virtually transforms multiple systems into a single system, allowing customers to centrally manage up to 144 XIV systems. IBM Hyper-Scale Mobility was released with XIV Storage System V11.3. It is a powerful function for moving volumes between storage containers transparently, with no disruption to host applications. IBM Hyper-Scale Consistency was released with the IBM XIV Storage Software Version 11.4. It offers cross-system consistency, enabling coordinated snapshots across independent XIV systems. It helps to ensure data protection across multiple XIV systems. This IBM RedpaperTM publication provides a broad understanding of the IBM Hyper-Scale feature. This publication is intended for XIV clients and users who want a practical understanding of IBM Hyper-Scale concepts and usage. For information about the IBM Hyper-Scale concepts, refer to the IBM white paper, IBM Hyper-Scale and Its Implementation in XIV Storage: A powerful new approach to scaling storage management.

Book IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z

Download or read book IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z written by Bertrand Dufrasne and published by IBM Redbooks. This book was released on 2021-06-15 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.

Book Getting Started with Linux on Z Encryption for Data At Rest

Download or read book Getting Started with Linux on Z Encryption for Data At Rest written by Bill White and published by . This book was released on 2019 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Book IBM Power Systems Virtualization Operation Management for SAP Applications

Download or read book IBM Power Systems Virtualization Operation Management for SAP Applications written by Dino Quintero and published by IBM Redbooks. This book was released on 2020-03-03 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: Businesses are using IBM® Power Systems servers and Linux to consolidate multiple SAP workloads onto fewer systems, increasing infrastructure utilization; reliability, availability, and serviceability (RAS); and scalability, and reducing cost. This IBM Redpaper publication describes key hardware and software components of an SAP solution stack. Furthermore, this book addresses non-functional items like RAS, security, and issue handling. Practical help for planning, implementation, configuration, installation, and monitoring of a solution stack are provided. This publication addresses topics for sellers, IT architects, IT specialists, and anyone who wants to implement and manage SAP workloads on IBM Power Systems servers. Moreover, this guide provides documentation to transfer how-to skills to the technical teams, and it provides solution guidance to the sales team. This publication complements documentation that is available at IBM Knowledge Center, and it aligns with educational materials that are provided by IBM Systems.

Book Security Guide for IBM i V6 1

Download or read book Security Guide for IBM i V6 1 written by Jim Cook and published by IBM Redbooks. This book was released on 2009-05-29 with total page 426 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.

Book IBM Spectrum Scale Security

Download or read book IBM Spectrum Scale Security written by Felipe Knop and published by IBM Redbooks. This book was released on 2018-09-18 with total page 116 pages. Available in PDF, EPUB and Kindle. Book excerpt: Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance. Security for storage systems can be classified as follows: Data storage (data at rest, which includes data durability and immutability) Access to data Movement of data (data in flight) Management of data IBM® Spectrum Scale is a software-defined storage system for high performance, large-scale workloads on-premises or in the cloud. IBM SpectrumTM Scale addresses all four aspects of security by securing data at rest (protecting data at rest with snapshots, and backups and immutability features) and securing data in flight (providing secure management of data, and secure access to data by using authentication and authorization across multiple supported access protocols). These protocols include POSIX, NFS, SMB, Hadoop, and Object (REST). For automated data management, it is equipped with powerful information lifecycle management (ILM) tools that can help administer unstructured data by providing the correct security for the correct data. This IBM RedpaperTM publication details the various aspects of security in IBM Spectrum ScaleTM, including the following items: Security of data in transit Security of data at rest Authentication Authorization Hadoop security Immutability Secure administration Audit logging Security for transparent cloud tiering (TCT) Security for OpenStack drivers Unless stated otherwise, the functions that are mentioned in this paper are available in IBM Spectrum Scale V4.2.1 or later releases.

Book IBM DS8000 Encryption for Data at Rest  Transparent Cloud Tiering  and Endpoint Security  DS8000 Release 9 0

Download or read book IBM DS8000 Encryption for Data at Rest Transparent Cloud Tiering and Endpoint Security DS8000 Release 9 0 written by Bert Dufrasne and published by . This book was released on 2020 with total page 200 pages. Available in PDF, EPUB and Kindle. Book excerpt: IBM® experts recognize the need for data protection, both from hardware or software failures, and from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8000® supports encryption-capable hard disk drives (HDDs) and flash drives. These Full Disk Encryption (FDE) drive sets are used with key management services that are provided by IBM Security Key Lifecycle Manager software or Gemalto SafeNet KeySecure to allow encryption for data at rest. Use of encryption technology involves several considerations that are critical for you to understand to maintain the security and accessibility of encrypted data. Failure to follow the requirements that are described in the IBM Redpaper can result in an encryption deadlock. Starting with Release 8.5 code, the DS8000 also supports Transparent Cloud Tiering (TCT) data object encryption. With TCT encryption, data is encrypted before it is transmitted to the cloud. The data remains encrypted in cloud storage and is decrypted after it is transmitted back to the IBM DS8000. Starting with DS8000 Release 9.0, the DS8900F provides Fibre Channel Endpoint Security when communicating with an IBM z15TM, which supports link authentication and the encryption of data that is in-flight. For more information, see IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z, SG24-8455. This edition focuses on IBM Security Key Lifecycle Manager Version 3.0.1.3 or later, which enables support Key Management Interoperability Protocol (KMIP) with the DS8000 Release 9.0 code or later and updated DS GUI for encryption functions.

Book IBM Software Defined Environment

Download or read book IBM Software Defined Environment written by Dino Quintero and published by IBM Redbooks. This book was released on 2015-08-14 with total page 820 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication introduces the IBM Software Defined Environment (SDE) solution, which helps to optimize the entire computing infrastructure--compute, storage, and network resources--so that it can adapt to the type of work required. In today's environment, resources are assigned manually to workloads, but that happens automatically in a SDE. In an SDE, workloads are dynamically assigned to IT resources based on application characteristics, best-available resources, and service level policies so that they deliver continuous, dynamic optimization and reconfiguration to address infrastructure issues. Underlying all of this are policy-based compliance checks and updates in a centrally managed environment. Readers get a broad introduction to the new architecture. Think integration, automation, and optimization. Those are enablers of cloud delivery and analytics. SDE can accelerate business success by matching workloads and resources so that you have a responsive, adaptive environment. With the IBM Software Defined Environment, infrastructure is fully programmable to rapidly deploy workloads on optimal resources and to instantly respond to changing business demands. This information is intended for IBM sales representatives, IBM software architects, IBM Systems Technology Group brand specialists, distributors, resellers, and anyone who is developing or implementing SDE.