Security on IBM Z/Vse Author:IBM Redbooks One of a firm's most valuable resources is its data: customer lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSETM system has extensive capabilities to simultaneously share the firm's data amon... more »g multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers are not only difficult to detect and prevent, they could have been using resources without the business even being aware they are there.
This document was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment.
This IBM Redbooks® publication provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.« less