Cargando…

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager

Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that resu...

Descripción completa

Detalles Bibliográficos
Autor principal: Bradley, Ryan
Otros Autores: Parisi, Angelo
Formato: Electrónico eBook
Idioma:Indeterminado
Publicado: [S.l.] : IBM Redbooks, 2015.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1281714454
003 OCoLC
005 20231017213018.0
006 m d
007 cr n |||
008 211010s2015 xx o ||| 0 und d
040 |a VT2  |b eng  |c VT2  |d TOH  |d OCLCQ 
020 |a 9780738440491 
020 |a 0738440493 
029 1 |a AU@  |b 000070307867 
035 |a (OCoLC)1281714454 
049 |a UAMI 
100 1 |a Bradley, Ryan. 
245 1 0 |a Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager  |h [electronic resource] /  |c Ryan Bradley. 
260 |a [S.l.] :  |b IBM Redbooks,  |c 2015. 
300 |a 1 online resource 
500 |a Title from content provider. 
520 |a Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed. Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent choice if you must comply with government or industry regulations for data privacy and encryption. To effectively manage a large deployment of SEDs in Lenovo® System x® servers, an organization must rely on a centralized key management solution. This IBM Redbooks® publication explains the technology behind SEDs and demonstrates how to deploy a key management solution that uses IBM Security Key Lifecycle Manager and properly setup your System x servers. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
700 1 |a Parisi, Angelo. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738440491/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP