Keeping up with security and compliance on IBM Z

Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added lia...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: White, Bill (VerfasserIn), Andre, Didier (VerfasserIn), Baer, Lindsay (VerfasserIn), Bergh, Julie (VerfasserIn), Cerquone, Giovanni (VerfasserIn), Cronin, Joe (VerfasserIn), Encarnacion, Diego (VerfasserIn), O'Brien, Wayne (VerfasserIn), Otto, Marius (VerfasserIn), Qadeer, Toobah (VerfasserIn), Ward, Laurie (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] IBM Redbooks 2023
Ausgabe:First edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-094103127
003 DE-627-1
005 20240228122020.0
007 cr uuu---uuuuu
008 230802s2023 xx |||||o 00| ||eng c
020 |a 9780738461175  |c electronic bk.  |9 978-0-7384-6117-5 
020 |a 0738461172  |c electronic bk.  |9 0-7384-6117-2 
035 |a (DE-627-1)094103127 
035 |a (DE-599)KEP094103127 
035 |a (ORHE)9780738461175 
035 |a (DE-627-1)094103127 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20230627 
100 1 |a White, Bill  |e VerfasserIn  |4 aut 
245 1 0 |a Keeping up with security and compliance on IBM Z  |c Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward 
250 |a First edition. 
264 1 |a [Place of publication not identified]  |b IBM Redbooks  |c 2023 
300 |a 1 online resource (136 pages)  |b illustrations (some color) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators. 
650 0 |a Information technology  |x Security measures 
650 0 |a Computer security  |x Management 
650 0 |a Computer networks  |x Security measures 
650 0 |a Data protection 
650 4 |a Technologie de l'information ; Sécurité ; Mesures 
650 4 |a Sécurité informatique ; Gestion 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Protection de l'information (Informatique) 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security ; Management 
650 4 |a Data protection 
650 4 |a Information technology ; Security measures 
700 1 |a Andre, Didier  |e VerfasserIn  |4 aut 
700 1 |a Baer, Lindsay  |e VerfasserIn  |4 aut 
700 1 |a Bergh, Julie  |e VerfasserIn  |4 aut 
700 1 |a Cerquone, Giovanni  |e VerfasserIn  |4 aut 
700 1 |a Cronin, Joe  |e VerfasserIn  |4 aut 
700 1 |a Encarnacion, Diego  |e VerfasserIn  |4 aut 
700 1 |a O'Brien, Wayne  |e VerfasserIn  |4 aut 
700 1 |a Otto, Marius  |e VerfasserIn  |4 aut 
700 1 |a Qadeer, Toobah  |e VerfasserIn  |4 aut 
700 1 |a Ward, Laurie  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780738461175/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-094103127
_version_ 1818767377749245952
adam_text
any_adam_object
author White, Bill
Andre, Didier
Baer, Lindsay
Bergh, Julie
Cerquone, Giovanni
Cronin, Joe
Encarnacion, Diego
O'Brien, Wayne
Otto, Marius
Qadeer, Toobah
Ward, Laurie
author_facet White, Bill
Andre, Didier
Baer, Lindsay
Bergh, Julie
Cerquone, Giovanni
Cronin, Joe
Encarnacion, Diego
O'Brien, Wayne
Otto, Marius
Qadeer, Toobah
Ward, Laurie
author_role aut
aut
aut
aut
aut
aut
aut
aut
aut
aut
aut
author_sort White, Bill
author_variant b w bw
d a da
l b lb
j b jb
g c gc
j c jc
d e de
w o wo
m o mo
t q tq
l w lw
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)094103127
(DE-599)KEP094103127
(ORHE)9780738461175
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition First edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04225cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-094103127</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122020.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461175</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6117-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461172</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6117-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094103127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103127</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230627</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Keeping up with security and compliance on IBM Z</subfield><subfield code="c">Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (136 pages)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andre, Didier</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baer, Lindsay</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bergh, Julie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cerquone, Giovanni</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cronin, Joe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Encarnacion, Diego</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Brien, Wayne</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Otto, Marius</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qadeer, Toobah</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ward, Laurie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461175/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-094103127
illustrated Illustrated
indexdate 2024-12-18T08:48:55Z
institution BVB
isbn 9780738461175
0738461172
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (136 pages) illustrations (some color)
psigel ZDB-30-ORH
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher IBM Redbooks
record_format marc
spelling White, Bill VerfasserIn aut
Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward
First edition.
[Place of publication not identified] IBM Redbooks 2023
1 online resource (136 pages) illustrations (some color)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.
Information technology Security measures
Computer security Management
Computer networks Security measures
Data protection
Technologie de l'information ; Sécurité ; Mesures
Sécurité informatique ; Gestion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Protection de l'information (Informatique)
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
Andre, Didier VerfasserIn aut
Baer, Lindsay VerfasserIn aut
Bergh, Julie VerfasserIn aut
Cerquone, Giovanni VerfasserIn aut
Cronin, Joe VerfasserIn aut
Encarnacion, Diego VerfasserIn aut
O'Brien, Wayne VerfasserIn aut
Otto, Marius VerfasserIn aut
Qadeer, Toobah VerfasserIn aut
Ward, Laurie VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780738461175/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle White, Bill
Andre, Didier
Baer, Lindsay
Bergh, Julie
Cerquone, Giovanni
Cronin, Joe
Encarnacion, Diego
O'Brien, Wayne
Otto, Marius
Qadeer, Toobah
Ward, Laurie
Keeping up with security and compliance on IBM Z
Information technology Security measures
Computer security Management
Computer networks Security measures
Data protection
Technologie de l'information ; Sécurité ; Mesures
Sécurité informatique ; Gestion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Protection de l'information (Informatique)
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
title Keeping up with security and compliance on IBM Z
title_auth Keeping up with security and compliance on IBM Z
title_exact_search Keeping up with security and compliance on IBM Z
title_full Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward
title_fullStr Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward
title_full_unstemmed Keeping up with security and compliance on IBM Z Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward
title_short Keeping up with security and compliance on IBM Z
title_sort keeping up with security and compliance on ibm z
topic Information technology Security measures
Computer security Management
Computer networks Security measures
Data protection
Technologie de l'information ; Sécurité ; Mesures
Sécurité informatique ; Gestion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Protection de l'information (Informatique)
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
topic_facet Information technology Security measures
Computer security Management
Computer networks Security measures
Data protection
Technologie de l'information ; Sécurité ; Mesures
Sécurité informatique ; Gestion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Protection de l'information (Informatique)
Computer networks ; Security measures
Computer security ; Management
Information technology ; Security measures
url https://learning.oreilly.com/library/view/-/9780738461175/?ar
work_keys_str_mv AT whitebill keepingupwithsecurityandcomplianceonibmz
AT andredidier keepingupwithsecurityandcomplianceonibmz
AT baerlindsay keepingupwithsecurityandcomplianceonibmz
AT berghjulie keepingupwithsecurityandcomplianceonibmz
AT cerquonegiovanni keepingupwithsecurityandcomplianceonibmz
AT croninjoe keepingupwithsecurityandcomplianceonibmz
AT encarnaciondiego keepingupwithsecurityandcomplianceonibmz
AT obrienwayne keepingupwithsecurityandcomplianceonibmz
AT ottomarius keepingupwithsecurityandcomplianceonibmz
AT qadeertoobah keepingupwithsecurityandcomplianceonibmz
AT wardlaurie keepingupwithsecurityandcomplianceonibmz