Getting started with IBM Hyper Protect Data Controller /
IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are k...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
IBM Redbooks,
2022.
|
Edition: | 1st edition. |
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000cam a22000007a 4500 | ||
---|---|---|---|
001 | in00006071757 | ||
006 | m o d | ||
007 | cr cnu|||||||| | ||
008 | 040122s2022 xx o 000 0 eng d | ||
005 | 20220712155521.9 | ||
035 | |a 1WRLDSHRon1291869137 | ||
040 | |a AU@ |b eng |c AU@ |d ORMDA |d OCLCO |d OCLCF | ||
020 | |z 9780738460031 | ||
020 | |z 0738460036 | ||
024 | 8 | |a 9780738460031 | |
035 | |a (OCoLC)1291869137 | ||
037 | |a 9780738460031 |b O'Reilly Media | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a TXMM | ||
100 | 1 | |a White, Bill, |e author. | |
245 | 1 | 0 | |a Getting started with IBM Hyper Protect Data Controller / |c White, Bill. |
250 | |a 1st edition. | ||
264 | 1 | |b IBM Redbooks, |c 2022. | |
300 | |a 1 online resource (268 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
520 | |a IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. | ||
542 | |f Copyright 2022 © IBM |g 2022 | ||
550 | |a Made available through: Safari, an O'Reilly Media Company. | ||
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cloud computing |x Security measures. | |
700 | 1 | |a Coulson, Andy, |e author. | |
700 | 1 | |a Hoareau, Guillaume, |e author. | |
700 | 1 | |a Katonica, Jason, |e author. | |
700 | 1 | |a Panting, Roy, |e author. | |
700 | 1 | |a Richard, Philippe, |e author. | |
700 | 1 | |a Weiss, Maxwell, |e author. | |
700 | 1 | |a Yan, Eva, |e author. | |
710 | 2 | |a Safari, an O'Reilly Media Company. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460031/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 00f851db-eca8-44c9-896e-ec8e333075b8 |i 356531c4-68f7-4f09-9cdb-c9d13839c76d |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e QA76.9.A25 |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460031/?ar |z CONNECT |