IBM XIV Security with Data-at-Rest Encryption

IBM XIV Security with Data-at-Rest Encryption PDF

Author: Bert Dufrasne

Publisher: IBM Redbooks

Published: 2014-08-11

Total Pages: 74

ISBN-13: 0738453552

DOWNLOAD EBOOK →

With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting "data at rest" is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. As with all of its features, the IBM® XIV® Storage System provides data-at-rest encryption at no charge. This gives clients the opportunity to take advantage of encryption and still enjoy the lower total cost of ownership that XIV offers. This IBM RedpaperTM publication explains the architecture and design of the XIV encryption solution and how it must be configured and implemented. It can help clients and Storage Administrators who want to enable data encryption on XIV storage systems.

Data-at-rest Encryption for the IBM Spectrum Accelerate Family

Data-at-rest Encryption for the IBM Spectrum Accelerate Family PDF

Author: Bert Dufrasne

Publisher: IBM Redbooks

Published: 2019-04-05

Total Pages: 130

ISBN-13: 0738457574

DOWNLOAD EBOOK →

With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting data-at-rest is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. The IBM® Spectrum Accelerate family, which includes IBM XIV® Storage System, IBM FlashSystem® A9000, IBM FlashSystem A9000R system(s), and IBM SpectrumTM Accelerate Software provides data-at-rest encryption at no charge. Clients can take advantage of encryption and still benefit from the lower total cost of ownership (TCO) that the IBM Spectrum AccelerateTM family offers. For IBM FlashSystem A9000 and A9000R, clients now have a choice between an external key manager-based implementation or a local key based encryption implementation. The local key solution offers a simplified deployment of data-at-rest encryption. This IBM RedpaperTM publication explains the architecture and design of the XIV and IBM FlashSystem A9000 and A9000R encryption solutions. Details are provided for configuring and implementing both solutions.

IBM System Storage Solutions Handbook

IBM System Storage Solutions Handbook PDF

Author: Ezgi Coskun

Publisher: IBM Redbooks

Published: 2016-07-15

Total Pages: 288

ISBN-13: 0738441740

DOWNLOAD EBOOK →

The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth, greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM SpectrumTM family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud. This IBM Redbooks® publication provides overviews and information about the most current IBM System Storage products. It shows how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM storage products can help you store, safeguard, retrieve, and share your data. This book is intended as a reference for basic and comprehensive information about the IBM Storage products portfolio. It provides a starting point for establishing your own enterprise storage environment. This book describes the IBM Storage products as of March, 2016.

XIV Storage System Product Guide

XIV Storage System Product Guide PDF

Author: Bert Dufrasne

Publisher: IBM Redbooks

Published: 2016-01-05

Total Pages: 24

ISBN-13: 0738454877

DOWNLOAD EBOOK →

The IBM XIV Storage System is a high-end flash optimized, fully scalable enterprise disk storage system that is based on a grid of standard hardware components. The architecture of the system is designed to deliver out-of-the box performance and ease of management while harnessing the high capacity and cost benefits of serial-attached SCSI (SAS) drives. The XIV Gen3 systems (and the Model 314 in particular) offer powerful real-time compression that is based on the IBM Random Access Compression Engine (RACE) technology. This IBM Redbooks Product Guide offers a brief overview of the IBM XIV Gen3 Storage System hardware and software features.

Getting Started with Linux on Z Encryption for Data At-Rest

Getting Started with Linux on Z Encryption for Data At-Rest PDF

Author: Bill White

Publisher: IBM Redbooks

Published: 2019-04-08

Total Pages: 120

ISBN-13: 0738457469

DOWNLOAD EBOOK →

This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

IBM System i Security: Protecting i5/OS Data with Encryption

IBM System i Security: Protecting i5/OS Data with Encryption PDF

Author: Yessong Johng

Publisher: IBM Redbooks

Published: 2008-07-24

Total Pages: 308

ISBN-13: 0738485373

DOWNLOAD EBOOK →

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected against unauthorized access or modifications. Several of the requirements state that data must be encrypted. IBM® i5/OS® offers several options that allow customers to encrypt data in the database tables. However, encryption is not a trivial task. Careful planning is essential for successful implementation of data encryption project. In the worst case, you would not be able to retrieve clear text information from encrypted data. This IBM Redbooks® publication is designed to help planners, implementers, and programmers by providing three key pieces of information: Part 1, "Introduction to data encryption" on page 1, introduces key concepts, terminology, algorithms, and key management. Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part. Part 2, "Planning for data encryption" on page 37, provides critical information for planning a data encryption project on i5/OS. Part 3, "Implementation of data encryption" on page 113, provides various implementation scenarios with a step-by-step guide.

IBM XIV Storage System Architecture and Implementation

IBM XIV Storage System Architecture and Implementation PDF

Author: Bertrand Dufrasne

Publisher: IBM Redbooks

Published: 2017-11-03

Total Pages: 488

ISBN-13: 0738440167

DOWNLOAD EBOOK →

Not a new version - included warning for self signed X509 certificates - see section 5.2 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL). In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.

IBM XIV Storage System Business Continuity Functions

IBM XIV Storage System Business Continuity Functions PDF

Author: Bertrand Dufrasne

Publisher: IBM Redbooks

Published: 2018-08-07

Total Pages: 442

ISBN-13: 0738440175

DOWNLOAD EBOOK →

The IBM XIV® Storage System has a rich set of copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and online backup solutions. These functions allow point-in-time copies, known as snapshots and full volume copies, and also include remote copy capabilities in either synchronous or asynchronous mode. A three-site mirroring function is now available to further improve availability and disaster recovery capabilities. These functions are included in the XIV software and all their features are available at no extra charge. The various copy functions are reviewed in separate chapters, which include detailed information about usage and practical illustrations. The book also illustrates the use of IBM® Tivoli® Storage Productivity Center for Replication to manage XIV Copy Services. This IBM Redbooks® publication is intended for anyone who needs a detailed and practical understanding of the XIV copy functions.

IBM Hyper-Scale in XIV Storage

IBM Hyper-Scale in XIV Storage PDF

Author: Bertrand Dufrasne

Publisher: IBM Redbooks

Published: 2014-11-24

Total Pages: 106

ISBN-13: 0738453986

DOWNLOAD EBOOK →

Organizations are struggling with an unprecedented surge in data, both user-created and machine-created. With an increasing reliance on this rapidly growing data, effective scaling of data storage represents a key challenge for all enterprises. IBM® Hyper-Scale helps you easily overcome provisioning scenarios that normally challenge traditional systems. IBM Hyper-Scale can accommodate several critical client scenarios for centralized administration, data mobility, load balancing, over-provisioning, and storage system repurposing. IBM Hyper-Scale introduces the following major concepts and technologies, with the IBM XIV® Storage System (Gen3 models): IBM Hyper-Scale Manager is a flexible, consolidated multi-system management application that builds upon the originally released Multi-System Manager with XIV Storage Software V11.2. IBM Hyper-Scale Manager is based on, and seamlessly integrated with, the XIV graphical user interface (GUI) and spans multiple XIV systems. It virtually transforms multiple systems into a single system, allowing customers to centrally manage up to 144 XIV systems. IBM Hyper-Scale Mobility was released with XIV Storage System V11.3. It is a powerful function for moving volumes between storage containers transparently, with no disruption to host applications. IBM Hyper-Scale Consistency was released with the IBM XIV Storage Software Version 11.4. It offers cross-system consistency, enabling coordinated snapshots across independent XIV systems. It helps to ensure data protection across multiple XIV systems. This IBM RedpaperTM publication provides a broad understanding of the IBM Hyper-Scale feature. This publication is intended for XIV clients and users who want a practical understanding of IBM Hyper-Scale concepts and usage. For information about the IBM Hyper-Scale concepts, refer to the IBM white paper, IBM Hyper-Scale and Its Implementation in XIV Storage: A powerful new approach to scaling storage management.