Skip to main content

Getting Started with z/OS Data Set Encryption

This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Please consider providing the information requested on the right. It will help us to create better materials in the future to support your needs.

I don't want to provide any input at this time, but let me download the publication anyway.

Getting Started with z/OS Data Set Encryption

This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Please consider providing the information requested on the right. It will help us to create better materials in the future to support your needs.

I don't want to provide any input at this time, but let me download the publication anyway.

Already have an IBM account? Log in

Business Contact Information:

1. Contact information

Phone
Open menu
We use phone in order to reach you for account related matters or, with your permission, to contact you related to other products and services.

2. Additional information