Keeping up with security and compliance on IBM Z
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added lia...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
IBM Redbooks
2023
|
Ausgabe: | First edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-094103127 | ||
003 | DE-627-1 | ||
005 | 20240228122020.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230802s2023 xx |||||o 00| ||eng c | ||
020 | |a 9780738461175 |c electronic bk. |9 978-0-7384-6117-5 | ||
020 | |a 0738461172 |c electronic bk. |9 0-7384-6117-2 | ||
035 | |a (DE-627-1)094103127 | ||
035 | |a (DE-599)KEP094103127 | ||
035 | |a (ORHE)9780738461175 | ||
035 | |a (DE-627-1)094103127 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230627 | |
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Keeping up with security and compliance on IBM Z |c Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward |
250 | |a First edition. | ||
264 | 1 | |a [Place of publication not identified] |b IBM Redbooks |c 2023 | |
300 | |a 1 online resource (136 pages) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators. | ||
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
700 | 1 | |a Andre, Didier |e VerfasserIn |4 aut | |
700 | 1 | |a Baer, Lindsay |e VerfasserIn |4 aut | |
700 | 1 | |a Bergh, Julie |e VerfasserIn |4 aut | |
700 | 1 | |a Cerquone, Giovanni |e VerfasserIn |4 aut | |
700 | 1 | |a Cronin, Joe |e VerfasserIn |4 aut | |
700 | 1 | |a Encarnacion, Diego |e VerfasserIn |4 aut | |
700 | 1 | |a O'Brien, Wayne |e VerfasserIn |4 aut | |
700 | 1 | |a Otto, Marius |e VerfasserIn |4 aut | |
700 | 1 | |a Qadeer, Toobah |e VerfasserIn |4 aut | |
700 | 1 | |a Ward, Laurie |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461175/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-094103127 |
---|---|
_version_ | 1818767377749245952 |
adam_text | |
any_adam_object | |
author | White, Bill Andre, Didier Baer, Lindsay Bergh, Julie Cerquone, Giovanni Cronin, Joe Encarnacion, Diego O'Brien, Wayne Otto, Marius Qadeer, Toobah Ward, Laurie |
author_facet | White, Bill Andre, Didier Baer, Lindsay Bergh, Julie Cerquone, Giovanni Cronin, Joe Encarnacion, Diego O'Brien, Wayne Otto, Marius Qadeer, Toobah Ward, Laurie |
author_role | aut aut aut aut aut aut aut aut aut aut aut |
author_sort | White, Bill |
author_variant | b w bw d a da l b lb j b jb g c gc j c jc d e de w o wo m o mo t q tq l w lw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)094103127 (DE-599)KEP094103127 (ORHE)9780738461175 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04225cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-094103127</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122020.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461175</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6117-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461172</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6117-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094103127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103127</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230627</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Keeping up with security and compliance on IBM Z</subfield><subfield code="c">Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (136 pages)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andre, Didier</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baer, Lindsay</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bergh, Julie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cerquone, Giovanni</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cronin, Joe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Encarnacion, Diego</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Brien, Wayne</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Otto, Marius</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qadeer, Toobah</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ward, Laurie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461175/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-094103127 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:55Z |
institution | BVB |
isbn | 9780738461175 0738461172 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (136 pages) illustrations (some color) |
psigel | ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IBM Redbooks |
record_format | marc |
spelling | White, Bill VerfasserIn aut Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward First edition. [Place of publication not identified] IBM Redbooks 2023 1 online resource (136 pages) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators. Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures Andre, Didier VerfasserIn aut Baer, Lindsay VerfasserIn aut Bergh, Julie VerfasserIn aut Cerquone, Giovanni VerfasserIn aut Cronin, Joe VerfasserIn aut Encarnacion, Diego VerfasserIn aut O'Brien, Wayne VerfasserIn aut Otto, Marius VerfasserIn aut Qadeer, Toobah VerfasserIn aut Ward, Laurie VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780738461175/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | White, Bill Andre, Didier Baer, Lindsay Bergh, Julie Cerquone, Giovanni Cronin, Joe Encarnacion, Diego O'Brien, Wayne Otto, Marius Qadeer, Toobah Ward, Laurie Keeping up with security and compliance on IBM Z Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
title | Keeping up with security and compliance on IBM Z |
title_auth | Keeping up with security and compliance on IBM Z |
title_exact_search | Keeping up with security and compliance on IBM Z |
title_full | Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward |
title_fullStr | Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward |
title_full_unstemmed | Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward |
title_short | Keeping up with security and compliance on IBM Z |
title_sort | keeping up with security and compliance on ibm z |
topic | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
topic_facet | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
url | https://learning.oreilly.com/library/view/-/9780738461175/?ar |
work_keys_str_mv | AT whitebill keepingupwithsecurityandcomplianceonibmz AT andredidier keepingupwithsecurityandcomplianceonibmz AT baerlindsay keepingupwithsecurityandcomplianceonibmz AT berghjulie keepingupwithsecurityandcomplianceonibmz AT cerquonegiovanni keepingupwithsecurityandcomplianceonibmz AT croninjoe keepingupwithsecurityandcomplianceonibmz AT encarnaciondiego keepingupwithsecurityandcomplianceonibmz AT obrienwayne keepingupwithsecurityandcomplianceonibmz AT ottomarius keepingupwithsecurityandcomplianceonibmz AT qadeertoobah keepingupwithsecurityandcomplianceonibmz AT wardlaurie keepingupwithsecurityandcomplianceonibmz |