Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Author :
Publisher : IBM Redbooks
Total Pages : 386
Release :
ISBN-10 : 9780738439914
ISBN-13 : 0738439916
Rating : 4/5 (916 Downloads)

Book Synopsis Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation by : Axel Buecker

Download or read book Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation written by Axel Buecker and published by IBM Redbooks. This book was released on 2014-10-12 with total page 386 pages. Available in PDF, EPUB and Kindle. Book excerpt: In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery. The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations. This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.


Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation Related Books

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Language: en
Pages: 386
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-10-12 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodie
Securing SQL Server
Language: en
Pages: 462
Authors: Denny Cherry
Categories: Computers
Type: BOOK - Published: 2015-04-27 - Publisher: Syngress

DOWNLOAD EBOOK

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive custom
Enterprise Security Risk Management
Language: en
Pages: 407
Authors: Brian Allen, Esq., CISSP, CISM, CPP, CFE
Categories: Business & Economics
Type: BOOK - Published: 2017-11-29 - Publisher: Rothstein Publishing

DOWNLOAD EBOOK

As a security professional, have you found that you and others in your company do not always define “security” the same way? Perhaps security interests and
A Practical Guide to TPM 2.0
Language: en
Pages: 375
Authors: Will Arthur
Categories: Computers
Type: BOOK - Published: 2015-01-28 - Publisher: Apress

DOWNLOAD EBOOK

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TP
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Language: en
Pages: 324
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2016-03-22 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasi