Security benefits of Red Hat Enterprise Linux 5 on IBM System z
|
|
- Thomasine Chandler
- 7 years ago
- Views:
Transcription
1 May, 2007 Security benefits of Red Hat Enterprise Linux 5 on IBM System z By Karl Wirth, Red Hat and Peter Spera, IBM Corp.
2 TOC Table of Contents Abstract... Security benefits of IBM System z... Physical security... Virtualization... Audit... Security benefits of Red Hat Enterprise Linux 5... Security benefits of Red Hat Enterprise Linux 5 on IBM System z... Common Criteria EAL4+ certification under CAPP, RBAC, LSPP on System z... Virtualization... Cryptographic acceleration... Centralized authentication... Summary... Page 3 Page 3 Page 4 Page 5 Page 5 Page 6 Page 6 Page 7
3 Abstract For decades, IBM mainframes have been the hardware platform of choice for secure computing. IBM System z builds on and extends this tradition. Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Red Hat Enterprise Linux 5 provides top-of-the-line security in a mainstream, open-source operating system. Working together, IBM and Red Hat have created a compelling solution for security Red Hat Enterprise Linux 5 on IBM System z. This paper will explore the security benefits of Red Hat Enterprise Linux 5 on IBM System z. Security benefits of IBM System z Physical security Physical security is a critical component of any security policy and an essential security benefit of a mainframe. Hundreds of boxes spread throughout an organization can introduce risk and complexity. The organization can be difficult to protect, both physically and logically. System z provides Logical Partitioning (LPAR) and z/vm on the mainframe to permit multiple images to reside side by side in the mainframe environment. These technologies provide the isolation required by enterprise and government customers in a Common Criteria certified environment. It is much simpler to protect one or several System z machines located in the core data center. Exposed networking configurations deployed in the distributed environment can be duplicated within the physically secure mainframe environment, adding the benefit of physical security and the ease of auditing the network deployment. Virtualization The benefits of physical security would be of little use if all of the applications consolidated onto the mainframe were run together in one logical image. For decades, IBM mainframes have been providing virtualization functionality. On System z, LPARs can be used to carve the massive mainframe resources into partitions that better represent the workload requirements. Within an LPAR, z/vm enables a large number of operating system images with diverse or associated applications to run simultaneously on the same machine, while maintaining the isolation of each image. Leveraging HiperSockets technology, System z can allow physically secure high-speed communication across images residing in separate LPARs.
4 Page 3 Audit Red Hat Enterprise Linux 5, along with IBM s System z, can provide high level of auditing capability which may help satisfy many of the most discerning customers. From the auditing capability integrated by Red Hat to the auditing capabilities of the mainframe (including LPAR, z/vm and networking connections), organizations can get the information they need to help them validate that their security policy is soundly deployed. Security benefits of Red Hat Enterprise Linux 5 Platform security must be a pervasive and fundamental part of the platform not just an add-on. It must be continually reviewed and maintained to ensure platform integrity. It must organically include the partner ecosystem and the larger platform community. For these reasons, Red Hat Enterprise Linux 5 stands out as a state-of-the-art, industry-leading choice for settings where security really matters. Four values define the Red Hat approach: Innovation. Red Hat leads the way in developing new security technology for Linux, from SE Linux and EAL 4+ certification (both described in the next section) to attack protection (detailed below). Plus the many additional innovations described in the Red Hat Enterprise Linux resource center: Transparency. The availability of the source code for Red Hat Enterprise Linux makes it an alternative for creating secure systems more transparent than proprietary code. The innovations in Red Hat Enterprise Linux 5 are due in no small part to the power of the open source development model, which combines the input of customers, partners, developers, end-users, and administrators. Vigilance. Red Hat continually looks for potential security exposures, certifying each package and delivering tested security updates through Red Hat Network. Customers can further strengthen their infrastructure through Red Hat services and support. Inclusiveness. Red Hat works closely with partners like IBM to make sure customers have choices when building a highly secure, integrated environment. Red Hat Enterprise Linux 5 includes four major innovations that help protect systems against attack, particularly in the area of buffer overflow and other memory-based attacks. These new features are: Fortify source. This check is now run on all selected packages. When the compiler knows the size of a buffer, it is possible to check that the buffer will not overflow. Stack smashing protection (canary values). The system will place a canary value at a randomized point above the stack. This canary value is verified during normal operation. If the stack has been smashed, the canary value will have been overwritten, indicating that the stack has indeed been smashed. This method can detect buffer overflows early.
5 Page 4 Pointer encryption. Function pointers are encrypted with unique random values. This is intended to detect an overwrite of a pointer in memory and prevent the subsequent redirect of execution. SELinux memory protection. This enhancement can prevent any memory that was writable from becoming executable. This prevents an attacker from writing his code into memory and then executing it. At Red Hat, the values of innovation, transparency, vigilance, and inclusiveness are not mere words, but business processes that produce and maintain the most secure product possible, while delivering the best value to customers. That's why Red Hat has consistently topped the CIO Insight Survey during the last three years. Security benefits of Red Hat Enterprise Linux 5 on IBM System z The Red Hat Enterprise Linux 5 System z solution can offer an organization the following additional security benefits. One Linux across the enterprise, end-to-end Red Hat's commitment to a unified code base means that Red Hat uses the same source code to deliver Red Hat Enterprise Linux on IBM System z as it does on an x86 platform. Stable, predictable mainstream Linux code for your mainframe environment and quicker resolution of security vulnerabilities. The same system administrators can run Red Hat Enterprise Linux on System z as they do on other platforms. Their expertise brings increased skill and accuracy, quicker response time, and greater overall enterprise security. Support for Security Enhanced Linux Unique to Red Hat Enterprise Linux, Security Enhanced Linux (SELinux) provides granular policy-based control over programs' access to data and kernel resources, preventing a compromised program from acting outside its policy. SELinux was developed in coordination with the open source community and the National Security Agency to provide the highest levels of security for the Linux operating system. SELinux is not a separate Linux distribution or branch. Rather, it is a feature of Red Hat Enterprise Linux. By default, over 200 core system services in Red Hat Enterprise Linux 5 are protected by targeted policies. So organizations can quickly benefit from the security provided by SELinux. As an added benefit, Red Hat Enterprise Linux 5 also includes enhanced SELinux management tools that simplify the process of creating, customizing, managing, and troubleshooting SELinux policy.
6 Page 5 Common Criteria EAL4+ certification under CAPP, RBAC, LSPP on System z Red Hat Enterprise Linux 5 is the first Linux operating system to ship with native support for the functionality necessary to meet Common Criteria for Trusted Operating Systems. This includes all functionality to enable EAL 4+ certification under the following protection profiles: CAPP (Controlled Access Protection Profile), RBAC (Role Based Access Control), and LSPP (Labeled Security Protection Profile). In addition to the Common Criteria certifications already available to customers of System z, IBM is sponsoring the EAL 4+ certification of Red Hat Enterprise Linux 5 on System z. The existing certifications, which include LSPP on z/vm and z/os, combined with the Red Hat Enterprise Linux 5 certification, help provide a security-rich platform environment capable of aiding customers to meet stringent public or private sector security policies. For government customers required to run Common Criteria for Trusted Operating Systems, Red Hat Enterprise Linux 5 provides an open source solution that natively supports multi-level security. This is an exciting mainstream option for customers realizing the benefits of the open source operating environment and consolidation on IBM's System z. Virtualization IBM s z/vm provides the security benefits of a historically proven virtualization environment for Red Hat Enterprise Linux on System z. Multiple Linux images can run side by side within the z/vm environment. These images can be entirely isolated or part of a bigger multi-image end-to-end solution. Networking between images can be implemented via virtual LANs and switches to provide the flexibility needed by any end-to-end enterprise solution. If a minimal number of images are required, LPARs could be considered as an alternative to z/vm; however, when used in conjunction they provide a highly configurable, extremely flexible alternative for running Red Hat Enterprise Linux and its workloads.
7 Page 6 Cryptographic acceleration Cryptographic functions needed to protect data, validate endpoints, or sign are vital to any secure application deployment, but they can be CPU-intensive when implemented in software. System z includes cryptographic instructions, SSL accelerators and secure tamper-sensing/tamper-responding hardware cryptographic coprocessors of which Red Hat Enterprise Linux can benefit from. These options give applications and enterprises the security, flexibility, and speed they need to hlep meet the many demands of today s end-to-end enterprise security requirements. IBM System z supports two approaches to key deployment, Secure Key and Clear Key. A Secure Key is a key that is encrypted under another key within the boundaries of the isolated hardware environment. While the encrypted version of that Secure Key may leave the hardware environment, the clear value of that key is never available outside the isolated hardware environment. Secure Keys and secure key functions are most often used by banking and finance applications. A Clear Key is a similar cryptographic key, but it is not encrypted under another key. Thus, cryptographic functions are quicker to perform with a Clear Key. The most pervasive example of Clear Key cryptography is the negotiation that takes place to enable an SSL-protected transaction. Internet users enlist their Web browser to connect to a store s server and order products via an SSL-protected transaction. Running Red Hat Enterprise Linux on System z will allow your organization to take advantage of the following cryptographic functions to add security and performance: 1. Clear Key RSA accelerator cards, as well as symmetric crypto and hash functions based on built-in hardware instructions for AES-128, DES, TDES, SHA-1, and SHA-256 are available with RHEL 5 2. Secure Key-based crypto hardware features are planned and will be supported in a future release. 3. Kernel crypto API support is planned and will be supported in a future release. This will allow crypto API calls from the kernel to, without modification, leverage the System z hardware crypto hardware instructions.* Centralized authentication The use of Pluggable Authentication Modules (PAM) permits Red Hat Enterprise Linux 5 images to seamlessly integrate with IBM s Resource Access Control Facility (RACF) Security Manager to manage and centralize user authentication. This feature is available via the LDAP server and RACF running on both z/vm and z/os.
8 Page 7 Summary For enterprise and government organizations, Red Hat Enterprise Linux 5 on IBM System z provides significant security benefits. System z provides robust physical security, virtualization, hardware cryptographic acceleration, and audit capabilities. Red Hat Enterprise Linux 5 combines an innovative, transparent, vigilant, and inclusive approach to security with a wide variety of features designed to protect systems against attack, particularly in the area of buffer overflow and other memory-based attacks. Red Hat Enterprise Linux 5 on System z gives organizations one Linux architecture across the enterprise, support for Security Enhanced Linux, a Common Criteria EAL4+ certification under CAPP, RBAC, and LSPP, cryptographic acceleration, and centralized authentication.
9 Page 8 Copyright IBM Corporation 2007 IBM Corporation New Orchard Rd. Armonk, NY U.S.A Produced in the United States of America 05/07 All Rights Reserved IBM, IBM logo, HiperSockets, RACF, System z, z/os, and z/vm are trademarks or registered trademarks of International Business Machines Corporation of the United States, other countries or both. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product, or service names may be trademarks or service marks of others. Information concerning non-ibm products was obtained from the suppliers of their products or their published announcements. Questions on the capabilities of the non-ibm products should be addressed with the suppliers. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. ZSW03012-USEN-00
Red Hat. www.redhat.com. By Karl Wirth
Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always
More informationCloud Computing with xcat on z/vm 6.3
IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab thang.pham@us.ibm.com Trademarks The following are trademarks of the International Business Machines Corporation in the
More informationHow to Deliver Measurable Business Value with the Enterprise CMDB
How to Deliver Measurable Business Value with the Enterprise CMDB James Moore jdmoore@us.ibm.com Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB
More informationTitle. Click to edit Master text styles Second level Third level
Title Click to edit Master text styles Second level Third level IBM s Vision For The New Enterprise Data Center Subram Natarajan Senior Consultant, STG Asia Pacific subram.natarajan@in.ibm.com Multiple
More informationCS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
More informationHow To Manage Energy At An Energy Efficient Cost
Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions
More informationEnergy Management in a Cloud Computing Environment
Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions
More informationIBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready
Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer
More informationHow To Write An Architecture For An Bm Security Framework
Security Reference Architecture James (Jimmy) Darwin James.Darwin@au.ibm.com 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified
More informationThe Consolidation Process
The Consolidation Process an overview Washington System Center IBM US Gaithersburg SIG User Group April 2009 Trademarks The following are trademarks of the International Business Machines Corporation in
More informationPerformance and scalability of a large OLTP workload
Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............
More informationIBM Software Services for Collaboration
An introduction to: IBM Collaboration Services for ProjExec ProjExec is easy to use professional project management software that is combined with innovative social features to provide project teams a
More informationData Transfer Tips and Techniques
Agenda Key: Session Number: System i Access for Windows: Data Transfer Tips and Techniques 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer to products that are not currently
More informationPractical Web Services for RPG IBM Integrated Web services for i
Agenda Key: Session Number: 32CG 540191 Practical Web Services for RPG IBM Integrated Web services for i Dan Hiebert IBM dhiebert@us.ibm.com 8 Copyright IBM Corporation, 2009. All Rights Reserved. This
More informationMigrating LAMP stack from x86 to Power using the Server Consolidation Tool
Migrating LAMP stack from x86 to Power using the Server Consolidation Tool Naveen N. Rao Lucio J.H. Correia IBM Linux Technology Center November 2014 Version 3.0 1 of 24 Table of Contents 1.Introduction...3
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationCA Aion Business Rules Expert r11
PRODUCT sheet: CA AION BUSINESS RULES EXPERT r11 CA Aion Business Rules Expert r11 CA Aion Business Rules Expert r11 (CA Aion BRE) is an industry-leading system that automates and streamlines business
More informationDetermining which Solutions are the Best Fit for Linux on System z Workloads
April, 2008 Determining which Solutions are the Best Fit for Linux on System z Workloads Bill Reeder, IBM Table of Contents Best Fit Applications... 2 Good Fit Applications... 6 Challenging Applications...
More informationz/vm Capacity Planning Overview
z/vm Capacity Planning Overview Bill Bitner z/vm Development Lab Customer Focus and Care bitnerb@us.ibm.com 2012, 2013 IBM Corporation Trademarks The following are trademarks of the International Business
More informationMaximo Business Intelligence Reporting Roadmap Washington DC Users Group
Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Pam Denny, IBM Email: pdenny@us.ibm.com Twitter: andbflo_denny May 2014 Please note IBM s statements regarding its plans, directions,
More informationConsolidated security management for mainframe clouds
Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security
More informationz/osmf Software Deployment Application- User Experience Enhancement Update
z/osmf Software Deployment Application- User Experience Enhancement Update Greg Daynes IBM Corporation August 8, 2012 Session Number 11697 Agenda Recent Enhancements Support for unmounted z/os UNIX file
More informationDataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
More informationIBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus
IBM MOBILE SECURITY SOLUTIONS - Identity and Access Focus May 2012 Executive Overview Mobile devices are pervasive in our daily lives and increasingly coming to work Bring Your Own Device (BYOD) IBM is
More informationTip and Technique on creating adhoc reports in IBM Cognos Controller
Tip or Technique Tip and Technique on creating adhoc reports in IBM Cognos Product(s): IBM Cognos Area of Interest: Financial Management 2 Copyright and Trademarks Licensed Materials - Property of IBM.
More informationVersion 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
More informationForecasting Performance Metrics using the IBM Tivoli Performance Analyzer
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills bonett@us.ibm.com 1 Corporation Trademarks
More informationSession Title: Cloud Computing 101 What every z Person must know
2009 System z Expo October 5 9, 2009 Orlando, FL Session Title: Cloud Computing 101 What every z Person must know Session ID: ZDI08 Frank J. De Gilio - degilio@us.ibm.com 2 3 View of Cloud Computing Application
More informationCA Encryption Key Manager r14.5
PRODUCT SHEET CA Encryption Key Manager CA Encryption Key Manager r14.5 CA Encryption Key Manager is a z/os-based, software cryptographic solution that helps ensure the highest availability of encryption
More informationIBM Endpoint Manager. Security and Compliance Analytics Setup Guide
IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the
More informationWhy Finance Should Automate Management & Regulatory Reporting Processes
May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional
More informationSession 1494: IBM Tivoli Storage FlashCopy Manager
Session 1494: IBM Tivoli Storage FlashCopy Manager Protecting your business-critical applications with IBM Tivoli Storage FlashCopy Manager 2011 IBM Corporation Session 1494: IBM Tivoli Storage FlashCopy
More informationCS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
More informationIBM Enterprise Linux Server
IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our
More informationPlatform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
More informationIBM SmartCloud Workload Automation
IBM SmartCloud Workload Automation Highly scalable, fault-tolerant solution offers simplicity, automation and cloud integration Highlights Gain visibility into and manage hundreds of thousands of jobs
More informationCommunications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
More informationDeploying a private database cloud on z Systems
Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks
More informationIBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com Why Snapshots Are Useful for Backup Faster backups without taking applications
More informationRedbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
More informationIBM Software Group. Lotus Domino 6.5 Server Enablement
IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months
More informationREDUCE RISK WITH ORACLE SOLARIS 11
REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce
More informationJava Application Performance Analysis and Tuning on IBM System i
IBM Systems & Technology Group Technical Conference 14 18 April, 2008, Sevilla, Spain Java Application Performance Analysis and Tuning on IBM System i iap02 Gottfried Schimunek Gottfried Schimunek Senior
More informationIBM Maximo Asset Configuration Manager
IBM Software Group IBM Maximo Asset Configuration Manager Ken Donnelly, Strategy & Market Management Rob Powell, Lead Product Architect 9 June 2008 2008 IBM Corporation Agenda Ken Donnelly, Strategy &
More informationDMZ. Many of us remember news clips. Living Next Door to the. Making the System z platform the ideal host for a business-critical DMZ
DMZ Living Next Door to the Making the System z platform the ideal host for a business-critical DMZ BY PETER SPERA ILLUSTRATION BY BOB SCOTT Many of us remember news clips or history lessons about demilitarized
More informationIBM Tivoli Composite Application Manager for WebSphere
Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the Create reports that deliver insight into life
More informationMainframe hardware course: Mainframe s processors
Mainframe hardware course: Mainframe s processors z/os Basic Skills: The mainframe s processors Mainframe s processors This hardware course introduces you to one model of IBM mainframe computer, the IBM
More informationSolution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
More informationUbiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices
Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices S. Rohit rohits@sg.ibm.com Trends in Enterprise Mobility The need for business agility along with changing employee
More informationIBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
More informationBackups in the Cloud Ron McCracken IBM Business Environment
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
More informationAccelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.
North America ATS Storage Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014 Thomas Fiege 1 2014 2014 IBM IBM Corporation
More informationIBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:
Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.
More informationOVA KVM THE SOLUTION. Virtually Unmatched. Get to know KVM. Low cost, super secure and infinitely scalable. JOIN WHAT IS GET SECURITY LOW COST
OVERVIEW SCALABILITY SECURITY LOW COST WHAT WE DO WHAT IS THE SOLUTION JOIN OVA OUR MISSION JOIN US OPEN SOURCE OVIRT USE CASES MEMBERS GET LINUX HYPERVISOR Virtually Unmatched. Get to know. Low cost,
More informationIntegrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system
Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems
More informationSuSE Linux High Availability Extensions Hands-on Workshop
SHARE Orlando August 2011 SuSE Linux High Availability Extensions Hands-on Workshop Richard F. Lewis IBM Corp rflewis@us.ibm.com Trademarks The following are trademarks of the International Business Machines
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationSystem z Batch Network Analyzer Tool (zbna) - Because Batch is Back!
System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the
More informationCommon Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
More informationIBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
More informationFOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
More informationIBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
More informationINFOBrief. Red Hat Enterprise Linux 4. Key Points
INFOBrief Red Hat Enterprise Linux 4 Key Points Red Hat Enterprise Linux 4 (RHEL 4) is the first release from Red Hat to support the 2.6 operating system kernel. This is a significant release as it contains
More informationInstalling on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
More informationArwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
More informationTivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
More informationIBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
More informationManaged Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
More informationMassimiliano Belardi Linux su Mainframe 10 anni di esperienze con i clienti
Massimiliano Belardi Linux su Mainframe 10 anni di esperienze con i clienti Linux brings open innovation to all IBM server and storage system platforms, freeing datacenters from vendor lock-in with choice
More informationFOR IMMEDIATE RELEASE Hitachi, Ltd. Red Hat K.K.
FOR IMMEDIATE RELEASE Hitachi, Ltd. Red Hat K.K. Hitachi Develops World s First Technology *1 to Enable Running Multiple Instances of Virtualization Software on a PC Server and Provides Highly Reliable
More informationAddress IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
More informationIBM Virtual Desktop Strategy
IBM Virtual Desktop Strategy optimizing time to value Gen 2 VDI can address your challenges optimize cost, efficiency, agility, resiliency, and security Cost IT challenges Protect data Recover from disasters,
More informationDEPLOYING IBM DB2 FOR LINUX, UNIX, AND WINDOWS DATA WAREHOUSES ON EMC STORAGE ARRAYS
White Paper DEPLOYING IBM DB2 FOR LINUX, UNIX, AND WINDOWS DATA WAREHOUSES ON EMC STORAGE ARRAYS Abstract This white paper provides an overview of key components, criteria, and requirements for deploying
More informationIBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
More informationUsing the Linux Samba Client with iseries NetServer
Session: 42006 47TC 7 Using the Linux Samba Client with NetServer Vern Yetzer yetzer@us.ibm.com April 2002 8 Copyright Corporation, 2002. All Rights Reserved. This publication may refer to products that
More informationIBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
More informationUPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
More informationSHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development jstapels@us.ibm.com Agenda Setting up HMC for Remote Use Securing User
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationSUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
More informationCisco and Red Hat: Application Centric Infrastructure Integration with OpenStack
Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack Cisco and Red Hat Extend the Cisco ACI Policy Framework to Red Hat Enterprise Linux OpenStack Platform Enabled Environments
More informationz/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
More informationIBM Maximo Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs and financial impact of IT assets with a single solution that tracks and manages your hardware, software
More informationThe EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
More informationSafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
More informationIBM Communications Server for Linux - Network Optimization for On Demand business
Optimizing your network infrastructure for on demand business IBM Communications Server for Linux - Network Optimization for On Demand business IBM Communications Server for Linux provides a cost-effective
More informationIBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
More informationEnhanced Virtualization on Intel Architecturebased
White Paper Server Virtualization on Intel Architecture Enhanced Virtualization on Intel Architecturebased Servers Improve Utilization, Manage Change, Reduce Costs Server virtualization on Intel processor-based
More informationIBM Cognos 10: Enhancing query processing performance for IBM Netezza appliances
IBM Software Business Analytics Cognos Business Intelligence IBM Cognos 10: Enhancing query processing performance for IBM Netezza appliances 2 IBM Cognos 10: Enhancing query processing performance for
More informationHitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U
Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U Datasheet Brings the performance and reliability of mainframe virtualization to blade computing BladeSymphony is the first true enterprise-class
More informationDeveloping Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1
Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory 1 Agenda Mobile web applications and Web Experience Factory High-level tour of Web Experience Factory automation
More informationAktuelles aus z/vm, z/vse, Linux on System z
Dr. Klaus Goebel IBM Research & Development, Böblingen, kgoebel@de.ibm.com Aktuelles aus z/vm, z/vse, Linux on System z z/vse z/vm Frühjahrstagung 2014, Frankfurt, 7.-9. April 2014 Trademarks The following
More informationWindows Server Virtualization An Overview
Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.
More informationDatabase lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
More informationSatish Mohan. Head Engineering. AMD Developer Conference, Bangalore
Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates
More informationUser Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed
More informationWebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
More informationRed Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
More informationIBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking
IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading
More informationTSM for Virtual Environments Data Protection for VMware
for Virtual Environments Data Protection for VMware Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management hitzler@de.ibm.com 2011 IBM Corporation Agenda Introduction for Virtual Environments 6.2
More information