IBM System Storage Open Systems Tape Encryption Solutions

IBM System Storage Open Systems Tape Encryption Solutions

Author: Alex Osuna

Publisher: IBM Redbooks

Published: 2010-12-08

Total Pages: 232

ISBN-13: 0738434809

DOWNLOAD EBOOK

This IBM® Redbooks® publication discusses IBM System Storage Open Systems Tape Encryption solutions. It specifically describes Tivoli Key Lifecycle Manager (TKLM) Version 2, which is a Java software program that manages keys enterprise-wide and provides encryption-enabled tape drives with keys for encryption and decryption. The book explains various methods of managing IBM tape encryption. These methods differ in where the encryption policies reside, where key management is performed, whether a key manager is required, and if required, how the tape drives communicate with it. The security and accessibility characteristics of encrypted data create considerations for clients which do not exist with storage devices that do not encrypt data. Encryption key material must be kept secure from disclosure or use by any agent that does not have authority to it; at the same time it must be accessible to any agent that has both the authority and need to use it at the time of need. This book is written for readers who need to understand and use the various methods of managing IBM tape encryption.


IBM PowerVM Virtualization Introduction and Configuration

IBM PowerVM Virtualization Introduction and Configuration

Author: Scott Vetter

Publisher: IBM Redbooks

Published: 2017-06-09

Total Pages: 790

ISBN-13: 0738438146

DOWNLOAD EBOOK

This IBM® Redbooks® publication provides an introduction to PowerVMTM virtualization technologies on Power System servers. PowerVM is a combination of hardware, firmware, and software that provides CPU, network, and disk virtualization. These are the main virtualization technologies: POWER7, POWER6, and POWER5 hardware POWER Hypervisor Virtual I/O Server Though the PowerVM brand includes partitioning, management software, and other offerings, this publication focuses on the virtualization technologies that are part of the PowerVM Standard and Enterprise Editions. This publication is also designed to be an introduction guide for system administrators, providing instructions for these tasks: Configuration and creation of partitions and resources on the HMC Installation and configuration of the Virtual I/O Server Creation and installation of virtualized partitions Examples using AIX, IBM i, and Linux This edition has been updated with the latest updates available and an improved content organization.


Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption

Author: Bill White

Publisher: IBM Redbooks

Published: 2021-12-10

Total Pages: 274

ISBN-13: 0738460222

DOWNLOAD EBOOK

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.


Implementing the IBM System Storage SAN32B-E4 Encryption Switch

Implementing the IBM System Storage SAN32B-E4 Encryption Switch

Author: Jon Tate

Publisher: IBM Redbooks

Published: 2011-03-07

Total Pages: 156

ISBN-13: 0738435295

DOWNLOAD EBOOK

This IBM® Redbooks® publication covers the IBM System Storage® SAN32B-E4 Encryption Switch, which is a high-performance stand-alone device designed to protect data-at-rest in mission-critical environments. In addition to helping IT organizations achieve compliance with regulatory mandates and meeting industry standards for data confidentiality, the SAN32B-E4 Encryption Switch also protects them against potential litigation and liability following a reported breach. Data is one of the most highly valued resources in a competitive business environment. Protecting that data, controlling access to it, and verifying its authenticity while maintaining its availability are priorities in our security-conscious world. Increasing regulatory requirements also drive the need for adequate data security. Encryption is a powerful and widely used technology that helps protect data from loss and inadvertent or deliberate compromise. In the context of data center fabric security, IBM provides advanced encryption services for Storage Area Networks (SANs) with the IBM System Storage SAN32B-E4 Encryption Switch. The switch is a high-speed, highly reliable hardware device that delivers fabric-based encryption services to protect data assets either selectively or on a comprehensive basis. The 8 Gbps SAN32B-E4 Fibre Channel Encryption Switch scales nondisruptively, providing from 48 up to 96 Gbps of encryption processing power to meet the needs of the most demanding environments with flexible, on-demand performance. It also provides compression services at speeds up to 48 Gbps for tape storage systems. Moreover, it is tightly integrated with one of the industry-leading, enterprise-class key management systems, the IBM Tivoli® Key Lifecycle Manager (TKLM), which can scale to support key life-cycle services across distributed environments.


IBM System Storage Business Continuity: Part 2 Solutions Guide

IBM System Storage Business Continuity: Part 2 Solutions Guide

Author: Charlotte Brooks

Publisher: IBM Redbooks

Published: 2009-06-09

Total Pages: 540

ISBN-13: 0738489727

DOWNLOAD EBOOK

This IBM Redbooks publication is a companion to IBM System Storage Business Continuity: Part 1 Planning Guide, SG24-6547 . We assume that the reader of this book has understood the concepts of Business Continuity planning described in that book. In this book we explore IBM System Storage solutions for Business Continuity, within the three segments of Continuous Availability, Rapid Recovery, and Backup and Restore. We position these solutions within the Business Continuity tiers. We describe, in general, the solutions available in each segment, then present some more detail on many of the products. In each case, the reader is pointed to sources of more information.


IBM System Storage Solutions Handbook

IBM System Storage Solutions Handbook

Author: Ezgi Coskun

Publisher: IBM Redbooks

Published: 2016-07-15

Total Pages: 288

ISBN-13: 0738441740

DOWNLOAD EBOOK

The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth, greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM SpectrumTM family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud. This IBM Redbooks® publication provides overviews and information about the most current IBM System Storage products. It shows how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM storage products can help you store, safeguard, retrieve, and share your data. This book is intended as a reference for basic and comprehensive information about the IBM Storage products portfolio. It provides a starting point for establishing your own enterprise storage environment. This book describes the IBM Storage products as of March, 2016.


Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch

Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch

Author: Jon Tate

Publisher: IBM Redbooks

Published: 2012-02-15

Total Pages: 262

ISBN-13: 0738436399

DOWNLOAD EBOOK

In this IBM® Redbooks® publication, we describe how these products can be combined to provide an encryption and virtualization solution: IBM System Storage® SAN32B-E4 Encryption Switch IBM Storwize® V7000 IBM Tivoli® Key Lifecycle Manager We describe the terminology that is used in an encrypted and virtualized environment, and we show how to implement these products to take advantage of their strengths. This book is intended for anyone who needs to understand and implement the IBM System Storage SAN32B-E4 Encryption Switch, IBM Storwize V7000, IBM Tivoli Key Lifecycle Manager, and encryption.


IBM Information Infrastructure Solutions Handbook

IBM Information Infrastructure Solutions Handbook

Author: Sangam Racherla

Publisher: IBM Redbooks

Published: 2010-07-11

Total Pages: 282

ISBN-13: 0738434485

DOWNLOAD EBOOK

An information infrastructure is comprised of software, servers, storage, and networks, integrated and optimized to deliver timely, secure, and trusted information throughout the organization and to its clients and partners. With the explosive growth in data and information—coupled with demands for projects with rapid ROI—IT infrastructures and storage administrators are reaching a breaking point. IBM® can help with the changes needed to manage information availability, security, and regulatory and compliance requirements on a tighter budget. And because the health of any business often depends on its ability to take advantage of information in real time, a sound, intelligent information infrastructure becomes critical to supporting new growth initiatives. IBM offers an innovative approach to help you manage information growth more effectively and mitigate risks with a dynamic infrastructure that efficiently and securely stores and protects information, and optimizes information access. You can control, protect, manage, and gain new intelligence from your information with the IBM leading-edge Information Infrastructure products, services and integrated solutions, supported by world-class expertise and access to top experts from around the world. This IBM Redbooks® publication provides an overview of the IBM Information Infrastructure solutions that are designed to help you manage the information explosion and address challenges of information compliance, availability, retention, and security. This will lead your company toward improved productivity, service delivery, and reduced risk, while streamlining costs.


Security Functions of IBM DB2 10 for z/OS

Security Functions of IBM DB2 10 for z/OS

Author: Paolo Bruni

Publisher: IBM Redbooks

Published: 2011-09-14

Total Pages: 456

ISBN-13: 0738436038

DOWNLOAD EBOOK

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.


IBM Spectrum Archive Single Drive Edition and Library Edition: Installation and Configuration Guide

IBM Spectrum Archive Single Drive Edition and Library Edition: Installation and Configuration Guide

Author: Larry Coyne

Publisher: IBM Redbooks

Published: 2018-03-22

Total Pages: 212

ISBN-13: 0738442984

DOWNLOAD EBOOK

The IBM® Linear Tape File SystemTM (LTFS) is the first file system that works along with Linear Tape-Open (LTO) tape technology to set a new standard for ease of use and portability for open systems tape storage. In 2011, LTFS won an Engineering Emmy Award for Innovation from the Academy of Television Arts & Sciences. This IBM Redbooks® publication helps you install, tailor, and configure the IBM SpectrumTM Archive Single Drive Edition (SDE) and the IBM Spectrum ArchiveTM Library Edition (LE) products. LTFS is a file system that was originally implemented on dual-partition linear tape (IBM LTO Ultrium 5 tape drives (LTO-5) and IBM TS1140 tape drives). Now IBM Spectrum Archive SDE and LE support IBM LTO Ultrium 8, 7, 6, or 5 tape drives, and IBM TS1155, IBM TS1150, and IBM TS1140 tape drives. IBM Spectrum Archive LE supports the IBM TS4500 tape library, IBM TS3500 tape library, IBM TS3310 tape library, IBM TS3200 tape library express, IBM TS3100 tape library express, and IBM TS2900 tape autoloader express. IBM Spectrum Archive makes tape look and work like any removable media, such as a USB drive. Files and directories appear on the desktop as a directory listing. It is now simple to drag files to and from tape. Any application that is written to use disk files works with the same files on tape. IBM Spectrum Archive SDE supports stand-alone drives only. IBM Spectrum Archive LE supports tape libraries. IBM Spectrum Archive LE presents each cartridge in the library as a subdirectory in the LTFS file system. With IBM Spectrum Archive LE, you can list the contents and search all of the volumes in the library without mounting the volumes by using an in-memory index. This publication is intended for anyone who wants to understand more about IBM Linear Tape System products and their implementation. This book is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists.