Crypto and the Trusted Key Entry (TKE) Workstation: Is a TKE in your Future?
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2013 ,
SHARE in San Francisco 2013
IBM provides the Trusted Key Entry Workstation (TKE) as a means for ensuring secure creation and management of key material and for managing the crypto adapters on the host. Recent versions of the TKE have greatly enhanced the management of those crypto adapters, including the ability to capture information from the current adapters, and then push that configuration to new adapters. This session will provide an overview of the TKE and its capabilities. And point out reasons why you should consider installing (and may be required to install) a TKE in your shop. Greg Boyd ; IBM Corporation
Back to Proceedings File Library