Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)

Size: px
Start display at page:

Download "Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)"

Transcription

1 Provably Secure Data Protection in the Cloud ICDES (IBM Cloud Data Encryption Services)

2 Agenda Cloud Security and Intro to ICDES Manish Aggarwal, IBM, Offering Manager Cloud Client Case Study: Crohn s & Colitis Foundation of America Angela Dobes, CCFA, Program Director Use-cases for ICDES Russ Fulford, Security First, VP Cloud Solutions Q&A 1

3 Hacks & Data Breaches Keep Growing Over 2 million the number of records compromised in cyber attacks daily 1 More than 3.8 million USD the cost to recover from a cyber breach 2 49 the percentage of data breaches that occur due to criminal attacks the number of days before a breach is detected the number of cyber breaches that happen every week Data Breach Trends, Risk Based Security Open Security Foundation, February 2015; 2, Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2015; 4 M-Trends 2015: A View from the Front Lines, Mandiant 2015; Global Report on the Cost of Cyber Crime, Ponemon Institute, October

4 Data Security is Evolving & Requires Layers Traditional Model Newer Model Network and perimeter centric Add data centric security, access controls & security intelligence IBM is the un-disputed leader in Enterprise Security and invests in best of breed technologies 3

5 Advanced Cryptographic Splitting Technology If you can t get the data you can t hack it. DATA AES # # #! # # & # # # $ # # # #! # # # # #? # # IDA # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # AES Encryption Information Dispersal Algorithm File keys encrypted & split by Workgroup Key Cryptographically split shares and keys are sent to Storage Workgroup Key encrypted and split by Perfect Secret Sharing 4

6 ICDES Delivers Robust Data Protection Confidentiality Ground-breaking data-centric security FIPS certified AES-256 Encryption 1 FIPS certified Cryptographic splitting 1 FIPS certified built-in simplified key management 1 Privacy Zero knowledge environments AVAILABILITY InfoSec Triad for Data Protection 1 Federal Information Processing Standard (FIPS) 5

7 ICDES Delivers Robust Data Protection Confidentiality Integrity Tampered data is not used Built in data health check Repair corrupt shares while still encrypted Always get what you started with AVAILABILITY InfoSec Triad for Data Protection 6

8 ICDES Delivers Robust Data Protection Confidentiality Integrity Availability Data resiliency added at server edge Data is Always ON - no recovery time for share failure Simplified data availability architecture Never lose file encryption keys Supports a reduced-cost HA and DR architecture AVAILABILITY InfoSec Triad for Data Protection 7

9 ICDES Delivers Robust Data Protection Confidentiality Integrity Availability Easier management of regulatory requirements 1 HIPAA HITECH FISMA Sarbanes-Oxley PCI DSS FedRAMP AVAILABILITY InfoSec Triad for Data Protection 1 Health Insurance Portability and Accountability Act of 1996 (HIPAA); Health Information Technology for Economic and Clinical Health Act (HITECH); Federal Information Security Management Act of 2002 (FISMA); Payment Card Industry Data Security Standard (PCI DSS) 8

10 ICDES Makes Data Security Easy PURCHASE ICDES Advanced Secure DOWNLOAD CONFIGURE IBM Cloud Marketplace 2 of 4 Step 1 /share1 /share2 /share3 /share4 START PROTECTING DATA DATA PROTECTED DIRECTORY Step 2 Step 3 Share 1 Share 2 Share 3 Share 4 9

11 Lowering Total Cost of Ownership Current Environment Customer Data Center With ICDES Cost Saving Options External Bulk Keystore Secure Private, Hybrid and Public Cloud Key Manager Built-In High Availability & Disaster Recovery M of N BUILT Built-In IN 10

12 Flexible Implementation Methods OS Installation Secure Datastore Target Select Files & Directories ICDES Plug-in for vcenter ICDES for vcenter Management Server Manage Virtual Machines CentOS ICDES APP APP APP APP Target CentOS OS OS OS OS Secure Datastore Virtual Physical 11

13 Use ICDES In Any Environment IBM SoftLayer IBM Bluebox Private Clouds Hybrid Clouds Public Clouds Customer data centers Public Private Hybrid 12

14 ICDES Editions Beyond Standard Encryption Secure Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting 1 of 1 Local Site

15 ICDES Editions Beyond Standard Encryption Secure Advanced Secure Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting + Fault tolerance 4 of 4 Data 1 resiliency of 1 and authentication Local Site

16 ICDES Editions Beyond Standard Encryption Remote Site Secure Advanced Secure Advanced Multi-site Users and Applications Compliance and Critical Business Data ICDES Server Data protection Keyed encryption Keyed splitting + Disaster recovery Multi-site capability + Fault tolerance 4 of 4 Data 1 resiliency of 1 and authentication Local Site

17 Agenda Cloud Security and Intro to ICDES Client Case Study: Crohn s & Colitis Foundation of America Use-cases for ICDES Q&A 16

18 What are Inflammatory Bowel Diseases? Crohn s Disease is a chronic inflammatory condition of the gastrointestinal tract that can affect any part of the body from the mouth to the anus Ulcerative Colitis is a chronic inflammatory condition limited to the colon 1.6M # of Americans living with IBD 70K # of new cases of IBD diagnosed in the US each year The CCFA is a non-profit organization dedicated to finding cures for IBD. 17

19 Challenges in IBD Current therapy for IBD is inadequate and inconsistently delivered Pathway to improved outcomes New resources to drive discovery Increased collaboration and sharing of data Improved patient selection Improved quality of care 18

20 IBD Plexus Vision & Goals Build of a research and information exchange platform to accelerate research and transform the care of IBD patients Goals of IBD Plexus are Unite clinicians, patients, academia and industry Optimize use of data and biosamples across the research community Identify new drug targets Identify new biomarkers and diagnostics Improve the quality of care for patients with IBD 19

21 Approach IBD Plexus will link data across study cohorts Break silos, bringing together stakeholders Clinical Omics / Expression Biosample Patient Reported / Generated & 20

22 IBD Plexus Landscape Pediatric risk stratification study Adult prospective research study Internet-based patient-powered registry Quality of care program Real world evidence registry Study Programs Components Adult & Pediatric Registries Biobank & LIMS Centralized Analytical Lab Data & Analytic Platforms High Performance Computing Researcher Portal Study Programs Components 21

23 IBD Plexus Hosting / Security IBM SoftLayer has been selected to host the IBD Plexus solution DATA PLATFORM Protected Health Information (PHI) ANALYTIC PLATFORM De-identified data sets Limited data sets Bare metal with CCFA stack Dedicated virtualized CCFA environment IBM Cloud Data Encryption Services (ICDES) 22

24 Disease Activity Transforming Research Current State Severe Moderate Mild Remission Time Disease Activity Future State Severe Moderate Mild Remission Hypothesis Generation Basic Science Translational Research Clinical Trials Comp Effectiveness Quality Improvement Time 23

25 Agenda Cloud Security and Intro to ICDES Client Case Study CCFA Use-cases for ICDES Q&A 24

26 Cryptographic Splitting Core ENTERPRISE Ingest Digital Data Addressable Storage Users & Applications Integrate with your Access Controls ICDES Server Generate keys Encryption & Authorization Bit Randomization (IDA) Fault Tolerance (M of N) Key Wrapping Journal Cache Disperse Shares to Storage 2 of 4 Example 25

27 CCFA Securing Structured and Unstructured Data Research, Academic and Medical Communities Various Patient, Academic & Research Data Cache Object Storage Gateway Data Platform Application protected by ICDES Object Storage IBD Plexus Data Analytic Platform Application protected by ICDES 26

28 Use Case: Compliance or Highly Valuable Data Unstructured User Community Application Data Server Payment Card Data CARD Your Name Protected Directory ICDES Server Secure 1 of 1 Structured Storage 27

29 Use Case: Compliance or Highly Valuable Data User Community Application Data Server Payment Card Data With Resiliency for Highly Available Data CARD Your Name Protected Directory ICDES Server Advanced Secure 2 of 4 Unstructured Structured Share 1 Share 2 Share 3 Share 4 Storage 28

30 Use Case: Compliance or Highly Valuable Data User Community Application Data Server CARD Your Name Remote Location Standby Database Server Payment Card Data Protected Directory ICDES Server Standby ICDES Server Add Geographic Separation of Data for Disaster Recovery Advanced Multi-Site 2 of 6 Share 1 Share 2 Share 3 Share 4 Storage Share 5 Share 6 29

31 Use Case: IBM Cloud Analytics Secure Hadoop Data Stored Securely in Object Storage User Community Application Data Server Hadoop Cluster Massive Data to be Analyzed Storage Gateway ISHOC 2 of 2 HDFS Location 1 Location 2 Object Storage 30

32 Agenda Cloud Security and Intro to ICDES Client Case Study CCFA Use-cases for ICDES Q&A 31

33 Notices and Disclaimers Copyright 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law 32

34 Notices and Disclaimers Con t. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: 33

35 Thank You Your Feedback is Important! Access the InterConnect 2016 Conference Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.

Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation

Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation Requirements Change Management and Artifact Workflow DOP-1027 DOORS Next Generation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without

More information

Cryptographic Keys Life Cycle Management for your Company

Cryptographic Keys Life Cycle Management for your Company Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center

More information

No CRM, No FTP, No Problem?

No CRM, No FTP, No Problem? No CRM, No FTP, No Problem? Everyone can build a customer journey. Chris Beaven Email Marketing Coordinator Towergate Insurance Direct 1 Mapping your ideal journey 2 TIP 1: Find out what your ideal customer

More information

ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery

ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery Carm Janneteau, Product Manager, Watson Analytics Robert Hatfield, Development Manager, Watson

More information

IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley

IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley IBM Watson IoT Platform Analytics Real-Time Insights Wayne Riley What Does IoT Real-Time Insights Do? Performs analytics on IoT data as in arrives at the IBM Watson IoT Platform Analytics applied immediately

More information

Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535

Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Ryan Dennings Auto-Owners Insurance Company October 28, 2015 2015 IBM Corporation Overview Auto-Owners Insurance

More information

The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team

The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team Please Note: IBM s statements regarding its plans, directions, and intent are subject to change

More information

B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825

B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825 B2B Omni-channel Marketing with IBM Marketing Cloud MCL-1825 Dale Price, Sr. Offering Manager, IBM Nickolas Wyatt, Marketing Manager, SUPPLY.com B2B Marketing and Buying Trends B2B Customers Customers

More information

JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences

JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences 09/09/2015 #ibmamplify @elianetozman and @jbrett 2015 IBM Corporation PLEASE NOTE: IBM s statements regarding its plans, directions,

More information

MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India

MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India Abhijit Thosar, ICICI Bank Limited Nishant Kulkarni, IBM Introduction ICICI Bank is an is an Indian

More information

BBP-2665 IBM BPM Process Modeling Experience on the Web

BBP-2665 IBM BPM Process Modeling Experience on the Web BBP-2665 IBM BPM Process Modeling Experience on the Web Victor Chan STSM, IBM BPM Tools & User Interface Thu, 25-Feb 11:30 AM - 12:15 PM Mandalay Bay SOUTH - Reef Ballroom D Please Note: IBM s statements

More information

Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami

Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami Taking the next hot mobile video game live with Docker and IBM SoftLayer Scott Porter, Daniel Krook, Shaun Murakami Agenda Mobile video gaming on the cloud The video gaming market in 2016 Typical mobile

More information

Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer

Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Please Note: IBM s statements regarding its plans, directions,

More information

YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.

YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm. YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions Eddie Lin IBM STSM, DS8000 Architecture edlin@us.ibm.com Please Note: IBM s statements regarding its plans, directions,

More information

How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience

How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience MBM-5829 Thorsten Gau (@tgau) IBM Distinguished Engineer v04 Zurich Insurance is... helping customers understand and protect

More information

Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM

Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM Enterprise Java Monitoring on z/os: Discover, Alert, Optimize Chris Walker IBM Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice

More information

Deliverability 101. #amplify15. 2015 International Business Machines Corporation

Deliverability 101. #amplify15. 2015 International Business Machines Corporation Deliverability 101 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at

More information

Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect

Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect Soar into the API Economy by Moving Services and Metadata from WSRR to IBM API Connect Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without

More information

Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016

Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Notices and Disclaimers Copyright 2016 by International

More information

Deliverability 201. #amplify15. 2015 International Business Machines Corporation

Deliverability 201. #amplify15. 2015 International Business Machines Corporation Deliverability 201 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at

More information

YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer

YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer YSS-1841 IBM Cloud Storage Options Tony Pearson IBM Master Inventor and Senior Software Engineer Cloud Storage Taxonomy Ephemeral Storage Typically boot volumes, page files and temporary data Goes away

More information

Keynote: Cyber Intelligence and Cyber Security Overview

Keynote: Cyber Intelligence and Cyber Security Overview 3/08/205 Keynote: Cyber and Cyber Security Overview David Waxman Executive Architect EIA Bob Stasio EIA for Cyber Security Product Manager Ralph Klaassen Senior Architect EIA 3/08/205 Important Disclaimer

More information

Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here

Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here Ro Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework Subtitle here Please Note: Ro IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without

More information

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher

More information

Java and Other Languages

Java and Other Languages Java and Other Languages Chris Bailey: STSM, IBM Runtime Monitoring 2015 IBM Corporation A Quick Survey 2 Percentage of Audience What languages do you use? 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Java

More information

IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467

IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467 IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467 Brian E Wilson IBM Cloud Middleware Connectivity & Integration Solution Architect Member of the

More information

CIOReview. Security First Corp Disruptive Innovation Re-Defining Data Security SDN SPECIAL. In My Opinion

CIOReview. Security First Corp Disruptive Innovation Re-Defining Data Security SDN SPECIAL. In My Opinion SDN SPECIAL AUGUST-14-2015 CIOREVIEW.COM In My Opinion Andre Fuetsch, SVP, Architecture & Design, AT&T Security First Corp Disruptive Innovation Re-Defining Data Security Mark O Hare, Founder, President

More information

Easily deploy and move enterprise applications in the cloud

Easily deploy and move enterprise applications in the cloud Easily deploy and move enterprise applications in the cloud IBM PureApplication solutions offer a simple way to implement a dynamic hybrid cloud environment 2 Easily deploy and move enterprise applications

More information

IBM FlashSystem Cloud Performance and Capability

IBM FlashSystem Cloud Performance and Capability IBM FlashSystem Cloud Performance and Capability Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information

More information

Communications Server for Linux

Communications Server for Linux Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity

More information

IBM Tivoli Service Request Manager 7.1

IBM Tivoli Service Request Manager 7.1 IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Speeding Cloud Foundry with Open Source OpenPOWER Hardware

Speeding Cloud Foundry with Open Source OpenPOWER Hardware Speeding Cloud Foundry with Open Source OpenPOWER Hardware Indrajit Poddar, STSM Systems Technical Strategy, IBM Andrei Yurkevich, Chief Technology Officer, Altoros Please Note: IBM s statements regarding

More information

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based

More information

DataPower z/os crypto integration

DataPower z/os crypto integration New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator

More information

IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note

IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices

More information

z/os V1R11 Communications Server system management and monitoring

z/os V1R11 Communications Server system management and monitoring IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North

More information

IBM Cognos Business Intelligence on Cloud

IBM Cognos Business Intelligence on Cloud IBM Cognos Business Intelligence on Cloud Operate and succeed at a new business speed Highlights Take advantage of world-class reporting, analysis, dashboards and visualization capabilities offered as

More information

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform: Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.

More information

IBM Cognos Controller Version 10.2.1. New Features Guide

IBM Cognos Controller Version 10.2.1. New Features Guide IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies

More information

Effective storage management and data protection for cloud computing

Effective storage management and data protection for cloud computing IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage

More information

BLACKICE ERA and PureData System for Analytics

BLACKICE ERA and PureData System for Analytics BLACKICE ERA and PureData System for Analytics Address new and evolving regulations and best practices Highlights Utilize 120+ best practices reports in Cognos and Excel; prepackaged and complete with

More information

IBM Enterprise Marketing Management. Domain Name Options for Email

IBM Enterprise Marketing Management. Domain Name Options for Email IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all

More information

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive

More information

Premier. Helping healthcare providers deliver the best possible care to their patients. Smart is...

Premier. Helping healthcare providers deliver the best possible care to their patients. Smart is... Premier Helping healthcare providers deliver the best possible care to their patients Smart is... Sharing and analyzing healthcare information to help physicians identify the best treatments for their

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note

IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.

More information

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what

More information

Analytics In the Cloud

Analytics In the Cloud Analytics In the Cloud 9 th September Presented by: Simon Porter Vice President MidMarket Sales Europe Disruptors are reinventing business processes and leading their industries with digital transformations

More information

IBM WebSphere Data Interchange V3.3

IBM WebSphere Data Interchange V3.3 IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic

More information

Tivoli Automation for Proactive Integrated Service Management

Tivoli Automation for Proactive Integrated Service Management Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,

More information

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

For healthcare, change is in the air and in the cloud

For healthcare, change is in the air and in the cloud IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

Focus on the business, not the business of data warehousing!

Focus on the business, not the business of data warehousing! Focus on the business, not the business of data warehousing! Adam M. Ronthal Technical Product Marketing and Strategy Big Data, Cloud, and Appliances @ARonthal 1 Disclaimer Copyright IBM Corporation 2014.

More information

New!! - Higher performance for Windows and UNIX environments

New!! - Higher performance for Windows and UNIX environments New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)

More information

IBM Cognos Controller Version 10.2.0. New Features Guide

IBM Cognos Controller Version 10.2.0. New Features Guide IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies

More information

IBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength

IBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength IBM Business Analytics Software Brazil Business Partner Rally March 19, 2013 IBM BA Software Practice Accelerator Program Leveraging IBM s Technical Strength Mark Enslin IBM Business Partner Enablement

More information

C05 Discovery of Enterprise zsystems Assets for API Management

C05 Discovery of Enterprise zsystems Assets for API Management C05 Discovery of Enterprise zsystems Assets for API Management Unlocking mainframe assets for mobile and cloud applications Haley Fung hfung@us.ibm.com IMS Mobile and APIM Development Lead * IMS Technical

More information

Tivoli Endpoint Manager for Configuration Management. User s Guide

Tivoli Endpoint Manager for Configuration Management. User s Guide Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.

Security for a Smarter Planet. 2011 IBM Corporation All Rights Reserved. Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet

More information

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS

More information

Packet Capture Users Guide

Packet Capture Users Guide IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

Applying IBM Security solutions to the NIST Cybersecurity Framework

Applying IBM Security solutions to the NIST Cybersecurity Framework IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements

More information

IBM Enterprise Marketing Management. Domain Name Options for Email

IBM Enterprise Marketing Management. Domain Name Options for Email IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies

More information

IBM Tivoli Netcool Configuration Manager

IBM Tivoli Netcool Configuration Manager IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

IBM Software Group. SW5706 JVM Tools. 2007 IBM Corporation 4.0. This presentation will act as an introduction to JVM tools.

IBM Software Group. SW5706 JVM Tools. 2007 IBM Corporation 4.0. This presentation will act as an introduction to JVM tools. SW5706 JVM Tools This presentation will act as an introduction to. 4.0 Page 1 of 15 for tuning and problem detection After completing this topic, you should be able to: Describe the main tools used for

More information

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures

More information

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization

More information

IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices

More information

Database lifecycle management

Database lifecycle management Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Getting Started With IBM Cúram Universal Access Entry Edition

Getting Started With IBM Cúram Universal Access Entry Edition IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Empowering intelligent utility networks with visibility and control

Empowering intelligent utility networks with visibility and control IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering

More information

WebSphere Commerce V7.0

WebSphere Commerce V7.0 IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version

More information

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that

More information

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

CS z/os Network Security Configuration Assistant GUI

CS z/os Network Security Configuration Assistant GUI Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies

More information

Installing on Windows

Installing on Windows Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,

More information

The IBM Archive Cloud Project: Compliant Archiving into the Cloud

The IBM Archive Cloud Project: Compliant Archiving into the Cloud Christian Bolik, IBM Research & Development, November 2010 The IBM Archive Cloud Project: Compliant Archiving into the Cloud (...or in German: Revisionssichere Ablage in der Cloud) Disclaimer Copyright

More information

Service Agreement: January 2008

Service Agreement: January 2008 International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these

More information

Deploying a private database cloud on z Systems

Deploying a private database cloud on z Systems Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks

More information

Business Process Management IBM Business Process Manager V7.5

Business Process Management IBM Business Process Manager V7.5 Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process

More information

Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum

Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users

More information

Creating a Cloud Backup Service. Deon George

Creating a Cloud Backup Service. Deon George Creating a Cloud Backup Service Deon George Agenda TSM Cloud Service features Cloud Service Customer, providing a internal backup service Internal Backup Cloud Service Service Provider, providing a backup

More information

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset

More information

and Security in the Era of Cloud

and Security in the Era of Cloud Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer

More information

IBM Lotus Protector for Mail Encryption. User's Guide

IBM Lotus Protector for Mail Encryption. User's Guide IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This

More information

IBM XIV Management Tools Version 4.7. Release Notes IBM

IBM XIV Management Tools Version 4.7. Release Notes IBM IBM XIV Management Tools Version 4.7 Release Notes IBM First Edition (September 2015) This edition applies to IBM XIV Management Tools version 4.7 release, and to all subsequent releases and modifications

More information

IBM Software Four steps to a proactive big data security and privacy strategy

IBM Software Four steps to a proactive big data security and privacy strategy Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw

More information