Skip to main content

Techdocs Library > Presentations & Tools >

Implementing z/OS Data Set Encryption



Document Author:
Additional Author(s):

Cecilia Carranza Lewis
Matthew G Hodak


Document ID:

PRS5397


Doc. Organization:

IBM Systems


Document Revised:

02/05/2019


Product(s) covered:

DFSMS; IBM System z; IBM Z; z Systems; z14; z/OS







Abstract: Learn how to implement z/OS data set encryption, along with best practices that enable our clients to protect their data at rest. This is a follow up to Ceci Lewis's presentation "z/OS Dataset Encryption Overview."

In this presentation, Ceci Lewis dives deeper into the implementation of z/OS Dataset Encryption. It begins with a brief recap of Dataset Encryption and continues with the different steps that z/OS Data Set Encryption requires and the personas who would perform each aspect within a client environment. The presentation concludes with several specific considerations and recommendations for clients around Dataset Encryption to ensure maximum data security.
IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.mp4IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.mp4IBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.pptxIBM Z Data Set Encryption Implementation - Ceci Lewis 1.8.19.pptx



Classification:

Hardware; Software; Solutions

Category:

Security

Solution(s):

IBM Security Solution



Platform(s):

IBM Z

S/W Pillar(s):

IBM System z Software

O/S:

z/OS

Keywords:

Pervasive Encryption, z/OS Dataset Encryption, Z Security


The Techdocs Library
Is this your first visit to Techdocs (the Technical Sales Library)?

Learn more


Techdocs QuickSearch

: