Security benefits of Red Hat Enterprise Linux 5 on IBM System z

Size: px
Start display at page:

Download "Security benefits of Red Hat Enterprise Linux 5 on IBM System z"

Transcription

1 May, 2007 Security benefits of Red Hat Enterprise Linux 5 on IBM System z By Karl Wirth, Red Hat and Peter Spera, IBM Corp.

2 TOC Table of Contents Abstract... Security benefits of IBM System z... Physical security... Virtualization... Audit... Security benefits of Red Hat Enterprise Linux 5... Security benefits of Red Hat Enterprise Linux 5 on IBM System z... Common Criteria EAL4+ certification under CAPP, RBAC, LSPP on System z... Virtualization... Cryptographic acceleration... Centralized authentication... Summary... Page 3 Page 3 Page 4 Page 5 Page 5 Page 6 Page 6 Page 7

3 Abstract For decades, IBM mainframes have been the hardware platform of choice for secure computing. IBM System z builds on and extends this tradition. Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Red Hat Enterprise Linux 5 provides top-of-the-line security in a mainstream, open-source operating system. Working together, IBM and Red Hat have created a compelling solution for security Red Hat Enterprise Linux 5 on IBM System z. This paper will explore the security benefits of Red Hat Enterprise Linux 5 on IBM System z. Security benefits of IBM System z Physical security Physical security is a critical component of any security policy and an essential security benefit of a mainframe. Hundreds of boxes spread throughout an organization can introduce risk and complexity. The organization can be difficult to protect, both physically and logically. System z provides Logical Partitioning (LPAR) and z/vm on the mainframe to permit multiple images to reside side by side in the mainframe environment. These technologies provide the isolation required by enterprise and government customers in a Common Criteria certified environment. It is much simpler to protect one or several System z machines located in the core data center. Exposed networking configurations deployed in the distributed environment can be duplicated within the physically secure mainframe environment, adding the benefit of physical security and the ease of auditing the network deployment. Virtualization The benefits of physical security would be of little use if all of the applications consolidated onto the mainframe were run together in one logical image. For decades, IBM mainframes have been providing virtualization functionality. On System z, LPARs can be used to carve the massive mainframe resources into partitions that better represent the workload requirements. Within an LPAR, z/vm enables a large number of operating system images with diverse or associated applications to run simultaneously on the same machine, while maintaining the isolation of each image. Leveraging HiperSockets technology, System z can allow physically secure high-speed communication across images residing in separate LPARs.

4 Page 3 Audit Red Hat Enterprise Linux 5, along with IBM s System z, can provide high level of auditing capability which may help satisfy many of the most discerning customers. From the auditing capability integrated by Red Hat to the auditing capabilities of the mainframe (including LPAR, z/vm and networking connections), organizations can get the information they need to help them validate that their security policy is soundly deployed. Security benefits of Red Hat Enterprise Linux 5 Platform security must be a pervasive and fundamental part of the platform not just an add-on. It must be continually reviewed and maintained to ensure platform integrity. It must organically include the partner ecosystem and the larger platform community. For these reasons, Red Hat Enterprise Linux 5 stands out as a state-of-the-art, industry-leading choice for settings where security really matters. Four values define the Red Hat approach: Innovation. Red Hat leads the way in developing new security technology for Linux, from SE Linux and EAL 4+ certification (both described in the next section) to attack protection (detailed below). Plus the many additional innovations described in the Red Hat Enterprise Linux resource center: Transparency. The availability of the source code for Red Hat Enterprise Linux makes it an alternative for creating secure systems more transparent than proprietary code. The innovations in Red Hat Enterprise Linux 5 are due in no small part to the power of the open source development model, which combines the input of customers, partners, developers, end-users, and administrators. Vigilance. Red Hat continually looks for potential security exposures, certifying each package and delivering tested security updates through Red Hat Network. Customers can further strengthen their infrastructure through Red Hat services and support. Inclusiveness. Red Hat works closely with partners like IBM to make sure customers have choices when building a highly secure, integrated environment. Red Hat Enterprise Linux 5 includes four major innovations that help protect systems against attack, particularly in the area of buffer overflow and other memory-based attacks. These new features are: Fortify source. This check is now run on all selected packages. When the compiler knows the size of a buffer, it is possible to check that the buffer will not overflow. Stack smashing protection (canary values). The system will place a canary value at a randomized point above the stack. This canary value is verified during normal operation. If the stack has been smashed, the canary value will have been overwritten, indicating that the stack has indeed been smashed. This method can detect buffer overflows early.

5 Page 4 Pointer encryption. Function pointers are encrypted with unique random values. This is intended to detect an overwrite of a pointer in memory and prevent the subsequent redirect of execution. SELinux memory protection. This enhancement can prevent any memory that was writable from becoming executable. This prevents an attacker from writing his code into memory and then executing it. At Red Hat, the values of innovation, transparency, vigilance, and inclusiveness are not mere words, but business processes that produce and maintain the most secure product possible, while delivering the best value to customers. That's why Red Hat has consistently topped the CIO Insight Survey during the last three years. Security benefits of Red Hat Enterprise Linux 5 on IBM System z The Red Hat Enterprise Linux 5 System z solution can offer an organization the following additional security benefits. One Linux across the enterprise, end-to-end Red Hat's commitment to a unified code base means that Red Hat uses the same source code to deliver Red Hat Enterprise Linux on IBM System z as it does on an x86 platform. Stable, predictable mainstream Linux code for your mainframe environment and quicker resolution of security vulnerabilities. The same system administrators can run Red Hat Enterprise Linux on System z as they do on other platforms. Their expertise brings increased skill and accuracy, quicker response time, and greater overall enterprise security. Support for Security Enhanced Linux Unique to Red Hat Enterprise Linux, Security Enhanced Linux (SELinux) provides granular policy-based control over programs' access to data and kernel resources, preventing a compromised program from acting outside its policy. SELinux was developed in coordination with the open source community and the National Security Agency to provide the highest levels of security for the Linux operating system. SELinux is not a separate Linux distribution or branch. Rather, it is a feature of Red Hat Enterprise Linux. By default, over 200 core system services in Red Hat Enterprise Linux 5 are protected by targeted policies. So organizations can quickly benefit from the security provided by SELinux. As an added benefit, Red Hat Enterprise Linux 5 also includes enhanced SELinux management tools that simplify the process of creating, customizing, managing, and troubleshooting SELinux policy.

6 Page 5 Common Criteria EAL4+ certification under CAPP, RBAC, LSPP on System z Red Hat Enterprise Linux 5 is the first Linux operating system to ship with native support for the functionality necessary to meet Common Criteria for Trusted Operating Systems. This includes all functionality to enable EAL 4+ certification under the following protection profiles: CAPP (Controlled Access Protection Profile), RBAC (Role Based Access Control), and LSPP (Labeled Security Protection Profile). In addition to the Common Criteria certifications already available to customers of System z, IBM is sponsoring the EAL 4+ certification of Red Hat Enterprise Linux 5 on System z. The existing certifications, which include LSPP on z/vm and z/os, combined with the Red Hat Enterprise Linux 5 certification, help provide a security-rich platform environment capable of aiding customers to meet stringent public or private sector security policies. For government customers required to run Common Criteria for Trusted Operating Systems, Red Hat Enterprise Linux 5 provides an open source solution that natively supports multi-level security. This is an exciting mainstream option for customers realizing the benefits of the open source operating environment and consolidation on IBM's System z. Virtualization IBM s z/vm provides the security benefits of a historically proven virtualization environment for Red Hat Enterprise Linux on System z. Multiple Linux images can run side by side within the z/vm environment. These images can be entirely isolated or part of a bigger multi-image end-to-end solution. Networking between images can be implemented via virtual LANs and switches to provide the flexibility needed by any end-to-end enterprise solution. If a minimal number of images are required, LPARs could be considered as an alternative to z/vm; however, when used in conjunction they provide a highly configurable, extremely flexible alternative for running Red Hat Enterprise Linux and its workloads.

7 Page 6 Cryptographic acceleration Cryptographic functions needed to protect data, validate endpoints, or sign are vital to any secure application deployment, but they can be CPU-intensive when implemented in software. System z includes cryptographic instructions, SSL accelerators and secure tamper-sensing/tamper-responding hardware cryptographic coprocessors of which Red Hat Enterprise Linux can benefit from. These options give applications and enterprises the security, flexibility, and speed they need to hlep meet the many demands of today s end-to-end enterprise security requirements. IBM System z supports two approaches to key deployment, Secure Key and Clear Key. A Secure Key is a key that is encrypted under another key within the boundaries of the isolated hardware environment. While the encrypted version of that Secure Key may leave the hardware environment, the clear value of that key is never available outside the isolated hardware environment. Secure Keys and secure key functions are most often used by banking and finance applications. A Clear Key is a similar cryptographic key, but it is not encrypted under another key. Thus, cryptographic functions are quicker to perform with a Clear Key. The most pervasive example of Clear Key cryptography is the negotiation that takes place to enable an SSL-protected transaction. Internet users enlist their Web browser to connect to a store s server and order products via an SSL-protected transaction. Running Red Hat Enterprise Linux on System z will allow your organization to take advantage of the following cryptographic functions to add security and performance: 1. Clear Key RSA accelerator cards, as well as symmetric crypto and hash functions based on built-in hardware instructions for AES-128, DES, TDES, SHA-1, and SHA-256 are available with RHEL 5 2. Secure Key-based crypto hardware features are planned and will be supported in a future release. 3. Kernel crypto API support is planned and will be supported in a future release. This will allow crypto API calls from the kernel to, without modification, leverage the System z hardware crypto hardware instructions.* Centralized authentication The use of Pluggable Authentication Modules (PAM) permits Red Hat Enterprise Linux 5 images to seamlessly integrate with IBM s Resource Access Control Facility (RACF) Security Manager to manage and centralize user authentication. This feature is available via the LDAP server and RACF running on both z/vm and z/os.

8 Page 7 Summary For enterprise and government organizations, Red Hat Enterprise Linux 5 on IBM System z provides significant security benefits. System z provides robust physical security, virtualization, hardware cryptographic acceleration, and audit capabilities. Red Hat Enterprise Linux 5 combines an innovative, transparent, vigilant, and inclusive approach to security with a wide variety of features designed to protect systems against attack, particularly in the area of buffer overflow and other memory-based attacks. Red Hat Enterprise Linux 5 on System z gives organizations one Linux architecture across the enterprise, support for Security Enhanced Linux, a Common Criteria EAL4+ certification under CAPP, RBAC, and LSPP, cryptographic acceleration, and centralized authentication.

9 Page 8 Copyright IBM Corporation 2007 IBM Corporation New Orchard Rd. Armonk, NY U.S.A Produced in the United States of America 05/07 All Rights Reserved IBM, IBM logo, HiperSockets, RACF, System z, z/os, and z/vm are trademarks or registered trademarks of International Business Machines Corporation of the United States, other countries or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product, or service names may be trademarks or service marks of others. Information concerning non-ibm products was obtained from the suppliers of their products or their published announcements. Questions on the capabilities of the non-ibm products should be addressed with the suppliers. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. ZSW03012-USEN-00

Red Hat. www.redhat.com. By Karl Wirth

Red Hat. www.redhat.com. By Karl Wirth Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always

More information

Cloud Computing with xcat on z/vm 6.3

Cloud Computing with xcat on z/vm 6.3 IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab thang.pham@us.ibm.com Trademarks The following are trademarks of the International Business Machines Corporation in the

More information

How to Deliver Measurable Business Value with the Enterprise CMDB

How to Deliver Measurable Business Value with the Enterprise CMDB How to Deliver Measurable Business Value with the Enterprise CMDB James Moore jdmoore@us.ibm.com Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB

More information

Title. Click to edit Master text styles Second level Third level

Title. Click to edit Master text styles Second level Third level Title Click to edit Master text styles Second level Third level IBM s Vision For The New Enterprise Data Center Subram Natarajan Senior Consultant, STG Asia Pacific subram.natarajan@in.ibm.com Multiple

More information

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher

More information

How To Manage Energy At An Energy Efficient Cost

How To Manage Energy At An Energy Efficient Cost Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions

More information

Energy Management in a Cloud Computing Environment

Energy Management in a Cloud Computing Environment Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions

More information

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer

More information

How To Write An Architecture For An Bm Security Framework

How To Write An Architecture For An Bm Security Framework Security Reference Architecture James (Jimmy) Darwin James.Darwin@au.ibm.com 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified

More information

The Consolidation Process

The Consolidation Process The Consolidation Process an overview Washington System Center IBM US Gaithersburg SIG User Group April 2009 Trademarks The following are trademarks of the International Business Machines Corporation in

More information

Performance and scalability of a large OLTP workload

Performance and scalability of a large OLTP workload Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............

More information

IBM Software Services for Collaboration

IBM Software Services for Collaboration An introduction to: IBM Collaboration Services for ProjExec ProjExec is easy to use professional project management software that is combined with innovative social features to provide project teams a

More information

Data Transfer Tips and Techniques

Data Transfer Tips and Techniques Agenda Key: Session Number: System i Access for Windows: Data Transfer Tips and Techniques 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer to products that are not currently

More information

Practical Web Services for RPG IBM Integrated Web services for i

Practical Web Services for RPG IBM Integrated Web services for i Agenda Key: Session Number: 32CG 540191 Practical Web Services for RPG IBM Integrated Web services for i Dan Hiebert IBM dhiebert@us.ibm.com 8 Copyright IBM Corporation, 2009. All Rights Reserved. This

More information

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

CA Aion Business Rules Expert r11

CA Aion Business Rules Expert r11 PRODUCT sheet: CA AION BUSINESS RULES EXPERT r11 CA Aion Business Rules Expert r11 CA Aion Business Rules Expert r11 (CA Aion BRE) is an industry-leading system that automates and streamlines business

More information

Determining which Solutions are the Best Fit for Linux on System z Workloads

Determining which Solutions are the Best Fit for Linux on System z Workloads April, 2008 Determining which Solutions are the Best Fit for Linux on System z Workloads Bill Reeder, IBM Table of Contents Best Fit Applications... 2 Good Fit Applications... 6 Challenging Applications...

More information

z/vm Capacity Planning Overview

z/vm Capacity Planning Overview z/vm Capacity Planning Overview Bill Bitner z/vm Development Lab Customer Focus and Care bitnerb@us.ibm.com 2012, 2013 IBM Corporation Trademarks The following are trademarks of the International Business

More information

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Pam Denny, IBM Email: pdenny@us.ibm.com Twitter: andbflo_denny May 2014 Please note IBM s statements regarding its plans, directions,

More information

Consolidated security management for mainframe clouds

Consolidated security management for mainframe clouds Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security

More information

z/osmf Software Deployment Application- User Experience Enhancement Update

z/osmf Software Deployment Application- User Experience Enhancement Update z/osmf Software Deployment Application- User Experience Enhancement Update Greg Daynes IBM Corporation August 8, 2012 Session Number 11697 Agenda Recent Enhancements Support for unmounted z/os UNIX file

More information

DataPower z/os crypto integration

DataPower z/os crypto integration New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator

More information

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus

IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus IBM MOBILE SECURITY SOLUTIONS - Identity and Access Focus May 2012 Executive Overview Mobile devices are pervasive in our daily lives and increasingly coming to work Bring Your Own Device (BYOD) IBM is

More information

Tip and Technique on creating adhoc reports in IBM Cognos Controller

Tip and Technique on creating adhoc reports in IBM Cognos Controller Tip or Technique Tip and Technique on creating adhoc reports in IBM Cognos Product(s): IBM Cognos Area of Interest: Financial Management 2 Copyright and Trademarks Licensed Materials - Property of IBM.

More information

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,

More information

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills bonett@us.ibm.com 1 Corporation Trademarks

More information

Session Title: Cloud Computing 101 What every z Person must know

Session Title: Cloud Computing 101 What every z Person must know 2009 System z Expo October 5 9, 2009 Orlando, FL Session Title: Cloud Computing 101 What every z Person must know Session ID: ZDI08 Frank J. De Gilio - degilio@us.ibm.com 2 3 View of Cloud Computing Application

More information

CA Encryption Key Manager r14.5

CA Encryption Key Manager r14.5 PRODUCT SHEET CA Encryption Key Manager CA Encryption Key Manager r14.5 CA Encryption Key Manager is a z/os-based, software cryptographic solution that helps ensure the highest availability of encryption

More information

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the

More information

Why Finance Should Automate Management & Regulatory Reporting Processes

Why Finance Should Automate Management & Regulatory Reporting Processes May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional

More information

Session 1494: IBM Tivoli Storage FlashCopy Manager

Session 1494: IBM Tivoli Storage FlashCopy Manager Session 1494: IBM Tivoli Storage FlashCopy Manager Protecting your business-critical applications with IBM Tivoli Storage FlashCopy Manager 2011 IBM Corporation Session 1494: IBM Tivoli Storage FlashCopy

More information

CS z/os Network Security Configuration Assistant GUI

CS z/os Network Security Configuration Assistant GUI Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network

More information

IBM Enterprise Linux Server

IBM Enterprise Linux Server IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our

More information

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,

More information

IBM SmartCloud Workload Automation

IBM SmartCloud Workload Automation IBM SmartCloud Workload Automation Highly scalable, fault-tolerant solution offers simplicity, automation and cloud integration Highlights Gain visibility into and manage hundreds of thousands of jobs

More information

Communications Server for Linux

Communications Server for Linux Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity

More information

Deploying a private database cloud on z Systems

Deploying a private database cloud on z Systems Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks

More information

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com Why Snapshots Are Useful for Backup Faster backups without taking applications

More information

Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau

Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage

More information

IBM Software Group. Lotus Domino 6.5 Server Enablement

IBM Software Group. Lotus Domino 6.5 Server Enablement IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months

More information

REDUCE RISK WITH ORACLE SOLARIS 11

REDUCE RISK WITH ORACLE SOLARIS 11 REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce

More information

Java Application Performance Analysis and Tuning on IBM System i

Java Application Performance Analysis and Tuning on IBM System i IBM Systems & Technology Group Technical Conference 14 18 April, 2008, Sevilla, Spain Java Application Performance Analysis and Tuning on IBM System i iap02 Gottfried Schimunek Gottfried Schimunek Senior

More information

IBM Maximo Asset Configuration Manager

IBM Maximo Asset Configuration Manager IBM Software Group IBM Maximo Asset Configuration Manager Ken Donnelly, Strategy & Market Management Rob Powell, Lead Product Architect 9 June 2008 2008 IBM Corporation Agenda Ken Donnelly, Strategy &

More information

DMZ. Many of us remember news clips. Living Next Door to the. Making the System z platform the ideal host for a business-critical DMZ

DMZ. Many of us remember news clips. Living Next Door to the. Making the System z platform the ideal host for a business-critical DMZ DMZ Living Next Door to the Making the System z platform the ideal host for a business-critical DMZ BY PETER SPERA ILLUSTRATION BY BOB SCOTT Many of us remember news clips or history lessons about demilitarized

More information

IBM Tivoli Composite Application Manager for WebSphere

IBM Tivoli Composite Application Manager for WebSphere Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the Create reports that deliver insight into life

More information

Mainframe hardware course: Mainframe s processors

Mainframe hardware course: Mainframe s processors Mainframe hardware course: Mainframe s processors z/os Basic Skills: The mainframe s processors Mainframe s processors This hardware course introduces you to one model of IBM mainframe computer, the IBM

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices S. Rohit rohits@sg.ibm.com Trends in Enterprise Mobility The need for business agility along with changing employee

More information

IBM Systems and Technology Group Technical Conference

IBM Systems and Technology Group Technical Conference IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster

More information

Backups in the Cloud Ron McCracken IBM Business Environment

Backups in the Cloud Ron McCracken IBM Business Environment Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.

More information

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014. North America ATS Storage Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014 Thomas Fiege 1 2014 2014 IBM IBM Corporation

More information

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform: Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.

More information

OVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST

OVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST OVERVIEW SCALABILITY SECURITY LOW COST WHAT WE DO WHAT IS THE SOLUTION JOIN OVA OUR MISSION JOIN US OPEN SOURCE OVIRT USE CASES MEMBERS GET LINUX HYPERVISOR Virtually Unmatched. Get to know. Low cost,

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

SuSE Linux High Availability Extensions Hands-on Workshop

SuSE Linux High Availability Extensions Hands-on Workshop SHARE Orlando August 2011 SuSE Linux High Availability Extensions Hands-on Workshop Richard F. Lewis IBM Corp rflewis@us.ibm.com Trademarks The following are trademarks of the International Business Machines

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the

More information

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing

More information

IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

FOR SERVERS 2.2: FEATURE matrix

FOR SERVERS 2.2: FEATURE matrix RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

INFOBrief. Red Hat Enterprise Linux 4. Key Points

INFOBrief. Red Hat Enterprise Linux 4. Key Points INFOBrief Red Hat Enterprise Linux 4 Key Points Red Hat Enterprise Linux 4 (RHEL 4) is the first release from Red Hat to support the 2.6 operating system kernel. This is a significant release as it contains

More information

Installing on Windows

Installing on Windows Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,

More information

Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group

Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,

More information

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

IBM WebSphere Data Interchange V3.3

IBM WebSphere Data Interchange V3.3 IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic

More information

Managed Services - A Paradigm for Cloud- Based Business Continuity

Managed Services - A Paradigm for Cloud- Based Business Continuity Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise

More information

Massimiliano Belardi Linux su Mainframe 10 anni di esperienze con i clienti

Massimiliano Belardi Linux su Mainframe 10 anni di esperienze con i clienti Massimiliano Belardi Linux su Mainframe 10 anni di esperienze con i clienti Linux brings open innovation to all IBM server and storage system platforms, freeing datacenters from vendor lock-in with choice

More information

FOR IMMEDIATE RELEASE Hitachi, Ltd. Red Hat K.K.

FOR IMMEDIATE RELEASE Hitachi, Ltd. Red Hat K.K. FOR IMMEDIATE RELEASE Hitachi, Ltd. Red Hat K.K. Hitachi Develops World s First Technology *1 to Enable Running Multiple Instances of Virtualization Software on a PC Server and Provides Highly Reliable

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

IBM Virtual Desktop Strategy

IBM Virtual Desktop Strategy IBM Virtual Desktop Strategy optimizing time to value Gen 2 VDI can address your challenges optimize cost, efficiency, agility, resiliency, and security Cost IT challenges Protect data Recover from disasters,

More information

DEPLOYING IBM DB2 FOR LINUX, UNIX, AND WINDOWS DATA WAREHOUSES ON EMC STORAGE ARRAYS

DEPLOYING IBM DB2 FOR LINUX, UNIX, AND WINDOWS DATA WAREHOUSES ON EMC STORAGE ARRAYS White Paper DEPLOYING IBM DB2 FOR LINUX, UNIX, AND WINDOWS DATA WAREHOUSES ON EMC STORAGE ARRAYS Abstract This white paper provides an overview of key components, criteria, and requirements for deploying

More information

IBM Tivoli Service Request Manager

IBM Tivoli Service Request Manager Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate

More information

Using the Linux Samba Client with iseries NetServer

Using the Linux Samba Client with iseries NetServer Session: 42006 47TC 7 Using the Linux Samba Client with NetServer Vern Yetzer yetzer@us.ibm.com April 2002 8 Copyright Corporation, 2002. All Rights Reserved. This publication may refer to products that

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

UPSTREAM for Linux on System z

UPSTREAM for Linux on System z PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging

More information

SHARE in Pittsburgh Session 15591

SHARE in Pittsburgh Session 15591 Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development jstapels@us.ibm.com Agenda Setting up HMC for Remote Use Securing User

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the

More information

Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack

Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack Cisco and Red Hat Extend the Cisco ACI Policy Framework to Red Hat Enterprise Linux OpenStack Platform Enabled Environments

More information

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications

More information

IBM Maximo Asset Management for IT

IBM Maximo Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

IBM Communications Server for Linux - Network Optimization for On Demand business

IBM Communications Server for Linux - Network Optimization for On Demand business Optimizing your network infrastructure for on demand business IBM Communications Server for Linux - Network Optimization for On Demand business IBM Communications Server for Linux provides a cost-effective

More information

IBM Tivoli Federated Identity Manager

IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations

More information

Enhanced Virtualization on Intel Architecturebased

Enhanced Virtualization on Intel Architecturebased White Paper Server Virtualization on Intel Architecture Enhanced Virtualization on Intel Architecturebased Servers Improve Utilization, Manage Change, Reduce Costs Server virtualization on Intel processor-based

More information

IBM Cognos 10: Enhancing query processing performance for IBM Netezza appliances

IBM Cognos 10: Enhancing query processing performance for IBM Netezza appliances IBM Software Business Analytics Cognos Business Intelligence IBM Cognos 10: Enhancing query processing performance for IBM Netezza appliances 2 IBM Cognos 10: Enhancing query processing performance for

More information

Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U

Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U Datasheet Brings the performance and reliability of mainframe virtualization to blade computing BladeSymphony is the first true enterprise-class

More information

Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1

Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1 Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory 1 Agenda Mobile web applications and Web Experience Factory High-level tour of Web Experience Factory automation

More information

Aktuelles aus z/vm, z/vse, Linux on System z

Aktuelles aus z/vm, z/vse, Linux on System z Dr. Klaus Goebel IBM Research & Development, Böblingen, kgoebel@de.ibm.com Aktuelles aus z/vm, z/vse, Linux on System z z/vse z/vm Frühjahrstagung 2014, Frankfurt, 7.-9. April 2014 Trademarks The following

More information

Windows Server Virtualization An Overview

Windows Server Virtualization An Overview Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.

More information

Database lifecycle management

Database lifecycle management Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand

More information

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates

More information

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed

More information

WebSphere Commerce V7.0

WebSphere Commerce V7.0 IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading

More information

TSM for Virtual Environments Data Protection for VMware

TSM for Virtual Environments Data Protection for VMware for Virtual Environments Data Protection for VMware Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com 2011 IBM Corporation Agenda Introduction for Virtual Environments 6.2

More information