Getting Started with Linux on Z Encryption for Data At-Rest

Getting Started with Linux on Z Encryption for Data At-Rest PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738457469
Category : Computers
Languages : en
Pages : 120

Get Book Here

Book Description
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Getting Started with Linux on Z Encryption for Data At-Rest

Getting Started with Linux on Z Encryption for Data At-Rest PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738457469
Category : Computers
Languages : en
Pages : 120

Get Book Here

Book Description
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Transitioning to Quantum-Safe Cryptography on IBM Z

Transitioning to Quantum-Safe Cryptography on IBM Z PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460680
Category : Computers
Languages : en
Pages : 208

Get Book Here

Book Description
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Maximizing Security with LinuxONE

Maximizing Security with LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738458988
Category : Computers
Languages : en
Pages : 80

Get Book Here

Book Description
LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples: Hardware accelerated encryption of data, which is delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry-leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that use LinuxONE security capabilities and practical use cases for these technologies. This publication was written for IT executives, architects, specialists, security administrators, and others who consider security for LinuxONE.

Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738460222
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Securing Your Cloud: IBM Security for LinuxONE

Securing Your Cloud: IBM Security for LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457949
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.

Practical Migration from x86 to LinuxONE

Practical Migration from x86 to LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738459305
Category : Computers
Languages : en
Pages : 228

Get Book Here

Book Description
LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. It fully embraces open source-based technology. Two servers are available for LinuxONE: The IBM® LinuxONE III LT1 and IBM LinuxONE III LT2. We describe these servers in "IBM LinuxONE servers" on page 5. Aside from still running SUSE Linux Enterprise Server and Red Hat Enterprise Linux Servers, LinuxONE runs Ubuntu, which is popular on x86 hardware. Ubuntu, which runs the cloud, smartphones, a computer that can remote control a planetary rover for NASA, many market-leading companies, and the Internet of Things, is now available on IBM LinuxONE servers. Together, these two technology communities deliver the perfect environment for cloud and DevOps. Ubuntu 16.04 on LinuxONE offers developers, enterprises, and Cloud Service Providers a scalable and secure platform for next generation applications that include OpenStack, KVM, Docker, and JuJu. The following are reasons why you would want to optimize your servers through virtualization using LinuxONE: Too many distributed physical servers with low utilization A lengthy provisioning process that delays the implementation of new applications Limitations in data center power and floor space High total cost of ownership (TCO) Difficulty allocating processing power for a dynamic environment This IBM Redbooks® publication provides a technical planning reference for IT organizations that are considering a migration from their x86 distributed servers to LinuxONE. This book walks you through some of the important considerations and planning issues that you might encounter during a migration project. Within the context of a pre-existing UNIX based or x86 environment, it presents an end-to-end view of the technical challenges and methods necessary to complete a successful migration to LinuxONE.

Scale up for Linux on LinuxONE

Scale up for Linux on LinuxONE PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457906
Category : Computers
Languages : en
Pages : 78

Get Book Here

Book Description
This book was written by IBM® IT specialists who have experience implementing Linux solutions on IBM LinuxONETM (LinuxONE). The contents of this book follow the guidelines from Linux regarding LinuxONE installations. The preferred practices that are described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This IBM Redbooks® publication provides you with the information needed in making a decision on scaling architecture when implementing Linux on LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE solution for each x86 server sprawl problem To provide virtualization and security options for LinuxOne The scaling up and scaling out architectures enable you to scale the capacity of an existing system to accommodate sporadic application demands or application workloads. This provides some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. This can potentially cause your enterprise to both waste resources and increase costs. Although scaling out on x86 systems is a common form of growth because of inexpensive x86 systems, the scale out can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase the number of physical servers and the resources needed to maintain them. LinuxONE servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the LinuxONE scaling option. The audience for this publication consists of the following groups: Customers, IBM Business Partners, IT architects and IT Specialists planning and installing Linux on LinuxONE System administrators managing the Linux Systems

Getting Started with Docker Enterprise Edition on IBM Z

Getting Started with Docker Enterprise Edition on IBM Z PDF Author: Lydia Parziale
Publisher: IBM Redbooks
ISBN: 0738457507
Category : Computers
Languages : en
Pages : 200

Get Book Here

Book Description
What is the difference between a virtual machine and a Docker container? A virtual machine (VM) is like a house. It is fully contained with its own plumbing and heating and cooling system. If you want another house, you build a new foundation, with new walls, new plumbing, and its own heating and cooling system. VMs are large. They start their own operating systems. Containers are like apartments in an apartment building. They share infrastructure. They can be many different sizes. You can have different sizes depending on the needs. Containers "live" in a Docker host. If you build a house, you need many resources. If you build an apartment building, each unit shares resources. Like an apartment, Docker is smaller and satisfies specific needs, is more agile, and more easily changed. This IBM® Redbooks® publication examines the installation and operation of Docker Enterprise Edition on the IBM Z® platform.

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z PDF Author: Bertrand Dufrasne
Publisher: IBM Redbooks
ISBN: 073845835X
Category : Computers
Languages : en
Pages : 116

Get Book Here

Book Description
This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.

Getting Started: Journey to Modernization with IBM Z

Getting Started: Journey to Modernization with IBM Z PDF Author: Makenzie Manna
Publisher: IBM Redbooks
ISBN: 0738459534
Category : Computers
Languages : en
Pages : 90

Get Book Here

Book Description
Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.