IBM XIV Security with Data-at-Rest Encryption IBM XIV Security with Data-at-Rest Encryption

IBM XIV Security with Data-at-Rest Encryption

Publisher Description

With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business.

Encrypting "data at rest" is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. As with all of its features, the IBM® XIV® Storage System provides data-at-rest encryption at no charge. This gives clients the opportunity to take advantage of encryption and still enjoy the lower total cost of ownership that XIV offers.

This IBM Redpaper™ publication explains the architecture and design of the XIV encryption solution and how it must be configured and implemented. It can help clients and Storage Administrators who want to enable data encryption on XIV storage systems.

GENRE
Computers & Internet
RELEASED
2014
August 11
LANGUAGE
EN
English
LENGTH
74
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
2
MB

More Books Like This

IBM System Storage Data Encryption IBM System Storage Data Encryption
2010
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
Implementing the IBM System Storage SAN32B-E4 Encryption Switch Implementing the IBM System Storage SAN32B-E4 Encryption Switch
2011
Security and Linux on z Systems Security and Linux on z Systems
2018
Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch
2012
Platform Embedded Security Technology Revealed Platform Embedded Security Technology Revealed
2014

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009