O'Reilly logo

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe by Richard Young, Nigel Williams, Frank Van Der Wal, Peter Siddell, David Shute, Wilhelm Mild, Richard Gamblin, Tony Duong, Raymond Chiang, Andy Armstrong, Aymeric Affouard, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Designing for security
In this chapter, we describe the unique security risks introduced by mobile devices and discuss the various steps that you can use to address these risks. We review the security solutions that can be used to secure mobile access to System z.
We compare several System z mobile security topologies:
Using IBM Worklight security
DataPower as a policy enforcement point
z/OS Connect
DataPower as a reverse proxy for Worklight server
DataPower XI50z as a second security layer
IBM Security Access Manager as a policy enforcement ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required