Cargando…

Keeping up with security and compliance on IBM Z /

Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added lia...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: White, Bill (Telecommunications engineer) (Autor), Andre, Didier (Autor), Baer, Lindsay (Autor), Bergh, Julie (Autor), Cerquone, Giovanni (Autor), Cronin, Joe (Autor), Encarnacion, Diego (Autor), O'Brien, Wayne (Autor), Otto, Marius (Autor), Qadeer, Toobah (Autor), Ward, Laurie (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : IBM Redbooks, 2023.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1386706284
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230627s2023 xx a o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCF  |d OCLCO 
020 |a 9780738461175  |q (electronic bk.) 
020 |a 0738461172  |q (electronic bk.) 
035 |a (OCoLC)1386706284 
037 |a 9780738461175  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230627 
049 |a UAMI 
100 1 |a White, Bill  |c (Telecommunications engineer),  |e author. 
245 1 0 |a Keeping up with security and compliance on IBM Z /  |c Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward. 
250 |a First edition. 
264 1 |a [Place of publication not identified] :  |b IBM Redbooks,  |c 2023. 
300 |a 1 online resource (136 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Andre, Didier,  |e author. 
700 1 |a Baer, Lindsay,  |e author. 
700 1 |a Bergh, Julie,  |e author. 
700 1 |a Cerquone, Giovanni,  |e author. 
700 1 |a Cronin, Joe,  |e author. 
700 1 |a Encarnacion, Diego,  |e author. 
700 1 |a O'Brien, Wayne,  |e author. 
700 1 |a Otto, Marius,  |e author. 
700 1 |a Qadeer, Toobah,  |e author. 
700 1 |a Ward, Laurie,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738461175/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP