First Experiences With Hardware Cryptographic Support for OpenSSH With Linux for System z

Setting up secure and protected severs and network environments is becoming increasingly important. Besides a general need to improve security of an IT environment, which drives activities to harden servers and networks, most companies have different policies and security guidelines to be followed by the IT departments. More and more external regulations from governments and other organizations require companies to implement specific levels of security compliance. Depending on a company's business, these apply to many IT environments. One such area is protection of data traffic between systems and networks.

Provided by: IBM Topic: Security Date Added: Apr 2010 Format: PDF

Download Now

Find By Topic