End to End Security with z Systems

End to End Security with z Systems

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

Download Now Read Online

Leave a Reply

Your email address will not be published. Required fields are marked *