
- Ordenar por:
- Fecha ▼
- Título
- Número de "me gusta"
- Comentarios
- Vistas
End-to-end data protection for your PGP-based infrastructure
|
|
Visits (4929)
You might also be interested in Getting Started With WebSphere Cast Iron
The publication also includes three detailed scenarios covering real-world implementations of a Cast Iron Integration Solution. Download "Getting Started with WebSphere Cast Iron Cloud Integration." Etiquetas:  encryption data-protection websphere pgp cast-iron #security data security |
Heartbleed and IBM Products: Where to get official news and information
|
|
Visits (6357)
Why?
Because IBM has a team of people whose job is specifically to monitor security vulnerability announcements and make sure the affected IBM products are made aware and to make sure patches get rolled out. They are the IBM Jon Tate has published a post on the System Storage Redbooks blog with more details on how to get plugged into the PSIRT team's announcements about Heartbleed and other security alerts. So go check that post out and get plugged in. You might also be interested in..... Encrypting Data With Confidence IBM has published a new white paper on encrypting data at enterprise scale. Learn about encrypting mission critical data with confidence and reduce security risks across the enterprise and beyond.
Download "Enc Etiquetas:  infrastructure data-protection ssl encryption data openssl #security heartbleed security |
What you need to know about GSKit, FIPS 140-2, and Suite B
|
|
Visits (5558)
You might also be interested in: Encrypting Data With Confidence: IBM published a new white paper on encrypting data at enterprise scale. Learn about encrypting mission critical data with confidence and reduce security risks across the enterprise and beyond. Download "Encrypting Data With Confidence." Etiquetas:  encryption data #security gskit suite-b security fips-140-2 |
Simplify management of IPsec tunnel configuration variables
|
|
Visits (5890)
IPsec -- the Internet Protocol Security technology protocol suite that authenticates and/or encrypts each IP packet of a communication session in order to secure IP communications -- is a foundation tool that can be complex to implement, especially in an enterprise comprised of many systems. There are two modes in which IPsec can be implemented:
Tunnel mode is an important concept but it can be quite a numbers nightmare. To use IPsec tunnels, each system under an enterprise's control must be configured individually using an XML configuration file or command line. Each IPsec tunnel between two systems has to be configured for more than 20 different parameters; only a few of these are machine dependent. To reduce the propensity for error from so many configuration variables, IBM introduced a feature in AIX IPsec that simplifies the process. In Simplify and centralize IPSec management on AIX, IBM Software Engineer Jyoti Tenginakai shows you how to use the centralized IPSec management feature in AIX that creates tunnels for each pair of IP addresses that are part of the IPsec configuration policy. Tenginakai also explains how to simplify and centralize management of a configuration using LDAP as a central repository.
Etiquetas:  encryption aix network_tunnels authentication internet_protocol_securit... virtual_private_network ibm-security ip_addresses ldap security vpn |