Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Author :
Publisher : IBM Redbooks
Total Pages : 390
Release :
ISBN-10 : 9780738439914
ISBN-13 : 0738439916
Rating : 4/5 (916 Downloads)

Book Synopsis Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation by : Axel Buecker

Download or read book Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation written by Axel Buecker and published by IBM Redbooks. This book was released on 2014-10-12 with total page 390 pages. Available in PDF, EPUB and Kindle. Book excerpt: In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery. The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations. This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation Related Books

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Language: en
Pages: 390
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-10-12 - Publisher: IBM Redbooks

GET EBOOK

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodie
Getting Started with z/OS Data Set Encryption
Language: en
Pages: 274
Authors: Bill White
Categories: Computers
Type: BOOK - Published: 2021-12-10 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on I
Getting Started: Journey to Modernization with IBM Z
Language: en
Pages: 90
Authors: Makenzie Manna
Categories: Computers
Type: BOOK - Published: 2021-03-15 - Publisher: IBM Redbooks

GET EBOOK

Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing
Using IBM Enterprise Records
Language: en
Pages: 440
Authors: Whei-Jen Chen
Categories: Computers
Type: BOOK - Published: 2015-05-29 - Publisher: IBM Redbooks

GET EBOOK

Records management helps users address evolving governance mandates to meet regulatory, legal, and fiduciary requirements. Proactive adherence to information re
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks

GET EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to