Download
Downloadable File
File link | File size | File description |
---|---|---|
Abstract
Learn how to implement z/OS data set encryption, along with best practices that enable our clients to protect their data at rest. This is a follow up to Ceci Lewis's presentation "z/OS Dataset Encryption Overview."
Download Description
In this presentation, Ceci Lewis dives deeper into the implementation of z/OS Dataset Encryption. It begins with a brief recap of Dataset Encryption and continues with the different steps that z/OS Data Set Encryption requires and the personas who would perform each aspect within a client environment. The presentation concludes with several specific considerations and recommendations for clients around Dataset Encryption to ensure maximum data security.
IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.mp4
IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.pptx
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
08 April 2022
UID
PRS5397