Securing your critical workloads with IBM Hyper Protect Services
Many organizations must protect their mission-critical applications in production, but security threats can also surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat...
Otros Autores: | , , , , , , , , , , , , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Poughkeepsie, NY :
IBM Corporation, IBM Redbooks
2020.
|
Edición: | First edition (March 2020) |
Colección: | IBM redbooks.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630768506719 |
Sumario: | Many organizations must protect their mission-critical applications in production, but security threats can also surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat given their super-user credentials and level of access to secrets or encryption keys. Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business. IBM® Cloud Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE. The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature gives customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require quick time to market and dependable rapid expansion. The purpose of this IBM Redbooks® publication is to: Introduce the IBM Hyper Protect Services that are running on IBM LinuxONE on the IBM Cloud™ and on-premises Provide high-level design architectures Describe deployment best practices Provide guides to getting started and examples of the use of the Hyper Protect Services The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators. |
---|---|
Notas: | "This edition applies to IBM Hyper Protect Virtual Servers V1.2.0, IBM Hyper Protect Crypto Services V1.0.0 and IBM Hyper Protect DBaaS V1.0.0"--Cover verso. Number on back cover: SG24-8469-00. |
Descripción Física: | 1 online resource (1 volume) : illustrations |
Bibliografía: | Includes bibliographical references. |