Securing Your Cloud: Assessing z/VM and Linux on IBM Z SecurityThe cloud is a part of the business technological landscape. As more workloads are being offloaded to IBM Z® based cloud environments, you must ensure that these workloads and environments are secure. In the ever-evolving landscape of IT, innovation and adaptability are paramount. Cloud computing, virtualization, big data analytics, artificial intelligence, and cybersecurity are a few of the many trends shaping the way businesses operate and interact with their customers. The need for insightful, practical, and up-to-date resources is critical. This IBM Redbooks® publication describes the necessary steps to secure your environment for all components that are involved in an IBM Z cloud infrastructure that uses IBM z/VM® and Linux on IBM Z. The audience for this book is IT architects, security consultants, and those clients that plan to use IBM Z for their cloud environments. |


