Live: Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Sacramento 2018 ,
2018
Join us for a step-by-step demonstration of data set encryption. See how to configure and start ICSF. See how to create Key Data Sets and generate cryptographic keys. See how to configure SAF resources and assign keys to data sets. See how to authorize data owners vs storage admins. Then read, write and print an encrypted data set.-Eysha Shirrine Powers-IBM
Back to Proceedings File Library