Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

4.11 - 1251 ratings - Source

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery. The IBMAr Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterpriseAr and distributed platforms for streamlined, efficient, and secure key and certificate management operations. This IBM RedbooksAr publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.ATM remote key load Newer ATMs support an RSA key based key exchange scheme. ... Furthermore, IBM Enterprise Key Management Foundation offers APIs that can generate terminal master keys (TMKs) in the ... IBM Enterprise Key Management Foundation can receive and print PIN codes that are generated, but it can also generate the PIN codes, print them, and return the encrypted PIN codes.

Title:Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Author: Axel Buecker, Mike Andreasen, Carsten Dahl Frehr, W. Craig Johnston, Alina Mot, Troels Norgaard, Soren Peen, Per Snowman, IBM Redbooks
Publisher:IBM Redbooks - 2014-10-12

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA