Securing Your Cloud: Assessing z/VM and Linux on IBM Z Security

Front Cover

The cloud is a part of the business technological landscape. As more workloads are being offloaded to IBM Z® based cloud environments, you must ensure that these workloads and environments are secure.

In the ever-evolving landscape of IT, innovation and adaptability are paramount. Cloud computing, virtualization, big data analytics, artificial intelligence, and cybersecurity are a few of the many trends shaping the way businesses operate and interact with their customers. The need for insightful, practical, and up-to-date resources is critical.

This IBM Redbooks® publication describes the necessary steps to secure your environment for all components that are involved in an IBM Z cloud infrastructure that uses IBM z/VM® and Linux on IBM Z.

The audience for this book is IT architects, security consultants, and those clients that plan to use IBM Z for their cloud environments.

 

Common terms and phrases

Bibliographic information