Keeping up with security and compliance on IBM Z

Book Cover
Average Rating
Published
[Place of publication not identified] : IBM Redbooks, 2023.
Status
Available Online

Description

Loading Description...

More Details

Format
Edition
First edition.
Language
English
ISBN
9780738461175, 0738461172

Notes

Description
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

White, B. (. e., Andre, D., Baer, L., Bergh, J., Cerquone, G., Cronin, J., Encarnacion, D., O'Brien, W., Otto, M., Qadeer, T., & Ward, L. (2023). Keeping up with security and compliance on IBM Z (First edition.). IBM Redbooks.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Bill (Telecommunications engineer), White et al.. 2023. Keeping Up With Security and Compliance On IBM Z. [Place of publication not identified]: IBM Redbooks.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Bill (Telecommunications engineer), White et al.. Keeping Up With Security and Compliance On IBM Z [Place of publication not identified]: IBM Redbooks, 2023.

Harvard Citation (style guide)

White, B. (. e., Andre, D., Baer, L., Bergh, J., Cerquone, G., Cronin, J. and Encarnacion, D. et al (2023). Keeping up with security and compliance on IBM Z. First edn. [Place of publication not identified]: IBM Redbooks.

MLA Citation, 9th Edition (style guide)

White, Bill (Telecommunications engineer),, et al. Keeping Up With Security and Compliance On IBM Z First edition., IBM Redbooks, 2023.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
cc2e180f-98cd-a4ec-7c53-953cbd042af2-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDcc2e180f-98cd-a4ec-7c53-953cbd042af2-eng
Full titlekeeping up with security and compliance on ibm z
Authorwhite bill
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-02-07 03:29:29AM

Book Cover Information

Image Sourcegoogle_isbn
First LoadedJan 7, 2025
Last UsedFeb 7, 2025

Marc Record

First DetectedDec 16, 2024 11:26:50 PM
Last File Modification TimeDec 17, 2024 08:26:16 AM
SuppressedRecord had no items

MARC Record

LEADER03951cam a22005177i 4500
001on1386706284
003OCoLC
00520241217082336.0
006m     o  d        
007cr cnu|||unuuu
008230627s2023    xx a    o     000 0 eng d
020 |a 9780738461175|q (electronic bk.)
020 |a 0738461172|q (electronic bk.)
035 |a (OCoLC)1386706284
037 |a 9780738461175|b O'Reilly Media
040 |a ORMDA|b eng|e rda|e pn|c ORMDA|d ORMDA|d OCLCF|d OCLCO|d OCLCL
049 |a MAIN
050 4|a QA76.9.A25
08204|a 005.8|2 23/eng/20230627
1001 |a White, Bill|c (Telecommunications engineer),|e author.|1 https://id.oclc.org/worldcat/entity/E39PCjKWWXgRjmB7hQHYPW9Q4q
24510|a Keeping up with security and compliance on IBM Z /|c Bill White, Didier Andre, Lindsay Baer, Julie Bergh, Giovanni Cerquone, Joe Cronin, Diego Encarnacion, Wayne O'Brien, Marius Otto, Toobah Qadeer, Laurie Ward.
250 |a First edition.
264 1|a [Place of publication not identified] :|b IBM Redbooks,|c 2023.
300 |a 1 online resource (136 pages) :|b illustrations (some color)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
520 |a Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your security posture in check? It starts with establishing a baseline: knowing and understanding your current security posture, comparing it with IBM Z℗ʼ security capabilities, and knowing the latest standards and regulations that are relevant to your organization. IBM Z Security and Compliance Center can help take the complexity out of your compliance workflow and the ambiguity out of audits while optimizing your audit process to reduce time and effort. This IBM Redbooks℗ʼ publication helps you make the best use of IBM Z Security and Compliance Center and aid in mapping all the necessary IBM Z security capabilities to meet compliance and improve your security posture. It also shows how to regularly collect and validate compliance data, and identify which data is essential for auditors. After reading this document, you will understand how your organization can use IBM Z Security and Compliance Center to enhance and simplify your security and compliance processes and postures for IBM z/OS℗ʼ systems. This publication is for IT managers and architects, system and security administrators.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Information technology|x Security measures.|9 95210
650 0|a Computer security|x Management.|9 93489
650 0|a Computer networks|x Security measures.|9 68848
650 0|a Data protection.|9 35538
7001 |a Andre, Didier,|e author.
7001 |a Baer, Lindsay,|e author.
7001 |a Bergh, Julie,|e author.
7001 |a Cerquone, Giovanni,|e author.
7001 |a Cronin, Joe,|e author.
7001 |a Encarnacion, Diego,|e author.
7001 |a O'Brien, Wayne,|e author.
7001 |a Otto, Marius,|e author.
7001 |a Qadeer, Toobah,|e author.
7001 |a Ward, Laurie,|e author.|9 217716
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9780738461175/?ar|x O'Reilly|z eBook
994 |a 92|b VIA
999 |c 359470|d 359470