Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

Publisher Description

IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today.

This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.

GENRE
Computers & Internet
RELEASED
2013
January 30
LANGUAGE
EN
English
LENGTH
346
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
3.4
MB

More Books Like This

Cloud Security Guidelines for IBM Power Systems Cloud Security Guidelines for IBM Power Systems
2016
Security for Linux on System z Security for Linux on System z
2013
DataPower SOA Appliance Administration, Deployment, and Best Practices DataPower SOA Appliance Administration, Deployment, and Best Practices
2011
Security on z/VM Security on z/VM
2007
IBM Cloud Private System Administrator's Guide IBM Cloud Private System Administrator's Guide
2019
RHCSA & RHCE  Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition RHCSA & RHCE  Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition
2015

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009

Customers Also Bought

Building the Infrastructure for Cloud Security Building the Infrastructure for Cloud Security
2014
Making an App Making an App
2012
Managing Risk and Information Security Managing Risk and Information Security
2013
Cyber Security Cyber Security
2019
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
Shell Scripting - A Primer Shell Scripting - A Primer
2014