compelled to find effective and cost-efficient data security solutions.
Encryption is one of the technologies that enables organizations to reduce the
cost, impact and even likelihood of a breach. Encrypting data can help companies
meet the stringent mandates of the GDPR, HIPAA and other mandates.
IBM z14 has been designed for pervasive encryption, enabling organizations to
encrypt 100% of an organizations IBM Z critical business data in-flight and
at-rest, with no application changes and no impact to SLAs. Encrypting only the
data required to meet compliance mandates should be considered a minimum
threshold, not a best practice. IBM z14 makes pervasive encryption the new
standard in data protection and the foundation of a larger data security and
z/OS is designed to provide new policy-based encryption options that take full
advantage of the improvements in the z14 platform. These new capabilities
Data set encryption, which is one aspect of pervasive encryption, provides
enhanced data protection for many z/OS data sets gives users the ability to
encrypt data without needing to make changes to applications to embed
encryption APIs within applications.
New z/OS policy controls which make it possible to use pervasive encryption to
protect user data and simplify the task of compliance for many z/OS data sets,
zFS file systems, and Coupling Facility structures.
Pervasive encryption for IBM Z is a consumable approach to enable
extensive encryption of data in-flight and at-rest to substantially simplify
encryption and reduce costs associated with protecting data.
In this course you will learn how to implement Pervasive Encryption in your
z/OS installation. The course explores in detail, the various technologies that
are involved in z System and z/OS Cryptographic Services, ICSF, RACF and DFSMS
access method Services.
In the hands-on exercises, you begin with the setup of your hardware crypto
environment (CCA crypto express and CPACF), then you will load and activate
your AES master keys, setup ICSF and its Key datasets (CKDS PKDS TKDS), then
define your data encryption keys, activate your data set encryption policy, and
encrypt your data sets and zFS file systems.
These exercises reinforce the concepts and technologies being covered in the
completing this course, you should be able to:
This class is
intended for z/OS system programmers and security specialists in charge of
designing, implementing and monitoring Pervasive Encryption on z/OS.
Please provide as much information as possible for us to help you with your enquiry.
© Copyright Trainocate 2019 . All rights reserved.