Abstract: Learn how to implement z/OS data set encryption, along with best practices that enable our clients to protect their data at rest. This is a follow up to Ceci Lewis's presentation "z/OS Dataset Encryption Overview."
In this presentation, Ceci Lewis dives deeper into the implementation of z/OS Dataset Encryption. It begins with a brief recap of Dataset Encryption and continues with the different steps that z/OS Data Set Encryption requires and the personas who would perform each aspect within a client environment. The presentation concludes with several specific considerations and recommendations for clients around Dataset Encryption to ensure maximum data security. IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.mp4IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.pptx
Classification:
Hardware; Software; Solutions
Category:
Security
Solution(s):
IBM Security Solution
Platform(s):
IBM Z
S/W Pillar(s):
IBM System z Software
O/S:
z/OS
Keywords:
Pervasive Encryption, z/OS Dataset Encryption, Z Security
The Techdocs Library
Is this your first visit to Techdocs (the Technical Sales Library)?