Linux on System z can inherit world-class security features
The open-source nature of Linux operating systems already provides a favorable security profile, but running Linux on System z further extends these advantages by integrating hardware-based security features into the operating environment.
Linux can run natively in a System z logical partition or it can run in a virtual machine under control of the z/VM virtualization software. With z/VM, Linux on System z gains some of its most valuable security and integrity features. In addition, Linux runs well in the same server, along z/OS and z/VSE operating systems. These scenarios all offer additional security and administrative functions to make Linux more secure and easier to administer than a similar Linux configuration running in a distributed environment.
Cryptography takes on a new face for Linux on System z applications. Clients who focus on security, can use Linux on System z to run workloads with highest security requirements.
A full range of security applications and tools are available from IBM, open source projects and other software vendors to support a complete and cost-effective security infrastructure for the Linux on System z environment.
The following articles describe usage scenarios that demonstrate the value of using Linux on System z in a comprehensive security infrastructure:
Once networks were secured, malicious hackers moved on to their next target: applications: web servers, database servers, file servers, etc. All are open to previously uncharted attack vectors.
With the ease of programming in the Linux environment and the security available in the System z hardware, Linux on System z applications provide the perfect playground to test the waters of cryptography.
The safety of the OS can be enhanced by bringing the critical components of the DMZ into the System z platform, where the hardware and software can work together.
The cryptographic support available to Linux on System z applications has grown past the obfuscation found in some distributed solutions, offering the diverse algorithms and access needed by mission-critical business applications protecting the enterprise from end to end.
Learn more how to customize Linux on System z to meet strict security, audit, and control regulations: