Ibm Qradar Version 7 3 Planning And Installation Guide

Ibm Qradar Version 7 3 Planning And Installation Guide Book in PDF, ePub and Kindle version is available to download in english. Read online anytime anywhere directly from your device. Click on the download button below to get a free pdf file of Ibm Qradar Version 7 3 Planning And Installation Guide book. This book definitely worth reading, it is an incredibly well-written.

IBM QRadar Version 7.3 Planning and Installation Guide

Author : Elias Carabaguiaz,Fabian Alfaro,Francisco Villalobos,Jeffry Arias,Kenneth Gonzalez,Warren Perez,IBM Redbooks
Publisher : IBM Redbooks
Page : 112 pages
File Size : 42,9 Mb
Release : 2018-01-04
Category : Computers
ISBN : 9780738442877

Get Book

IBM QRadar Version 7.3 Planning and Installation Guide by Elias Carabaguiaz,Fabian Alfaro,Francisco Villalobos,Jeffry Arias,Kenneth Gonzalez,Warren Perez,IBM Redbooks Pdf

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: the company's information. This IBM® Redbooks® publication provides information about implementing IBM QRadar® for Security Intelligence and Event Monitoring (SIEM) and protecting an organization's networks through a sophisticated technology, which permits a proactive security posture. It is divided in to the following major sections to facilitate the integration of QRadar with any network architecture: Chapter 2, "Before the installation" on page 3 provides a review of important requirements before the installation of the product. Chapter 3, "Installing IBM QRadar V7.3" on page 57 provides step-by-step procedures to guide you through the installation process. Chapter 4, "After the installation" on page 77 helps you to configure additional features and perform checks after the product is installed. QRadar is an IBM Security prime product that is designed to be integrated with corporate network devices to keep a real-time monitoring of security events through a centralized console. Through this book, any network or security administrator can understand the product's features and benefits.

Cyber Resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy

Author : IBM,IBM Redbooks
Publisher : IBM Redbooks
Page : 58 pages
File Size : 54,8 Mb
Release : 2022-07-11
Category : Computers
ISBN : 9780738460628

Get Book

Cyber Resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy by IBM,IBM Redbooks Pdf

The focus of this Blueprint publication is to highlight the early threat detection capabilities of IBM® QRadar® and to show how to proactively start a cyber-resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM's Copy Services Manager as orchestration software to start IBM Spectrum Virtualize for Public Cloud (SV4PC) Safeguarded Copy functions. The IBM SV4PC Safeguarded Copy function creates an immutable copy of the data in an air-gapped form on the same IBM SV4PC on Azure for isolation and eventual quick recovery. This document describes the steps that are involved to enable and forward IBM SV4PC audit logs to IBM QRadar. It also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. This document also explains how to register a storage system and create a scheduled task by using IBM Copy Services Manager. Finally, this document also describes deploying IBM QRadar and SV4PC on Azure. A use case for protecting the MS SQL database (DB) volume that was created on IBM SV4PC is included. Upon threat detection on a database volume, Safeguarded Copy is started for IBM SV4PC volume. The Safeguarded Copy creates an immutable copy of the data. The same data volume can be recovered or restored by using IBM's Copy Services Manager.

Deployment Guide for InfoSphere Guardium

Author : Whei-Jen Chen,Boaz Barkai,Joe M DiPietro,Vladislav Langman,Daniel Perlov,Roy Riah,Yosef Rozenblit,Abdiel Santos,IBM Redbooks
Publisher : IBM Redbooks
Page : 472 pages
File Size : 49,7 Mb
Release : 2015-04-14
Category : Computers
ISBN : 9780738439358

Get Book

Deployment Guide for InfoSphere Guardium by Whei-Jen Chen,Boaz Barkai,Joe M DiPietro,Vladislav Langman,Daniel Perlov,Roy Riah,Yosef Rozenblit,Abdiel Santos,IBM Redbooks Pdf

IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements. This IBM Redbooks® publication provides a guide for deploying the Guardium solutions. This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products. The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system. This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.

Building a Next-Gen SOC with IBM QRadar

Author : Ashish M Kothekar,Sandeep Patil
Publisher : Packt Publishing Ltd
Page : 198 pages
File Size : 42,9 Mb
Release : 2023-06-28
Category : Computers
ISBN : 9781801079181

Get Book

Building a Next-Gen SOC with IBM QRadar by Ashish M Kothekar,Sandeep Patil Pdf

Discover how different QRadar components fit together and explore its features and implementations based on your platform and environment Purchase of the print or Kindle book includes a free PDF eBook Key Features Get to grips with QRadar architecture, components, features, and deployments Utilize IBM QRadar SIEM to respond to network threats in real time Learn how to integrate AI into threat management by using QRadar with Watson Book Description This comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time. The book begins with a quick introduction to QRadar components and architecture, teaching you the different ways of deploying QRadar. You'll grasp the importance of being aware of the major and minor upgrades in software and learn how to scale, upgrade, and maintain QRadar. Once you gain a detailed understanding of QRadar and how its environment is built, the chapters will take you through the features and how they can be tailored to meet specifi c business requirements. You'll also explore events, flows, and searches with the help of examples. As you advance, you'll familiarize yourself with predefined QRadar applications and extensions that successfully mine data and find out how to integrate AI in threat management with confidence. Toward the end of this book, you'll create different types of apps in QRadar, troubleshoot and maintain them, and recognize the current security challenges and address them through QRadar XDR. By the end of this book, you'll be able to apply IBM QRadar SOC's prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise. What you will learn Discover how to effectively use QRadar for threat management Understand the functionality of different QRadar components Find out how QRadar is deployed on bare metal, cloud solutions, and VMs Proactively keep up with software upgrades for QRadar Understand how to ingest and analyze data and then correlate it in QRadar Explore various searches, and learn how to tune and optimize them See how to maintain and troubleshoot the QRadar environment with ease Who this book is for This book is for security professionals, SOC analysts, security engineers, and any cybersecurity individual looking at enhancing their SOC and SIEM skills and interested in using IBM QRadar to investigate incidents in their environment to provide necessary security analytics to responsible teams. Basic experience with networking tools and knowledge about cybersecurity threats is necessary to grasp the concepts present in this book.

IBM Virtualization Engine, Version 1

Author : IBM Redbooks,Christian Matthys
Publisher : Vervante
Page : 398 pages
File Size : 48,7 Mb
Release : 2005-01-01
Category : Computers
ISBN : 0738492779

Get Book

IBM Virtualization Engine, Version 1 by IBM Redbooks,Christian Matthys Pdf

Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar

Author : IBM Storage,IBM Redbooks
Publisher : IBM Redbooks
Page : 58 pages
File Size : 50,7 Mb
Release : 2021-10-15
Category : Computers
ISBN : 9780738459875

Get Book

Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar by IBM Storage,IBM Redbooks Pdf

The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® and the Safeguarded Copy feature that is available as part of IBM FlashSystem® and IBM SAN Volume Controller. Such early detection protects and quickly recovers the data if a cyberattack occurs. This document describes integrating IBM FlashSystem audit logs with IBM QRadar, and the configuration steps for IBM FlashSystem and IBM QRadar. It also explains how to use the IBM QRadar's device support module (DSM) editor to normalize events and assign IBM QRadar identifier (QID) map to the events. Post IBM QRadar configuration, we review configuring Safeguarded Copy on the application volumes by using volume groups and applying Safeguarded backup polices on the volume group. Finally, we demonstrate the use of orchestration software IBM Copy Services Manager to start a recovery, restore operations for data restoration on online volumes, and start a backup of data volumes.

Getting Started with z/OS Data Set Encryption

Author : Bill White,Cecilia Carranza Lewis,Eysha Shirrine Powers,David Rossi,Eric Rossman,Andy Coulsonr,Jacky Doll,Brad Habbershow,Thomas Liu,Ryan McCarry,Philippe Richard,Romoaldo Santos,Isabel Arnold,Kasper Lindberg,IBM Redbooks
Publisher : IBM Redbooks
Page : 274 pages
File Size : 53,8 Mb
Release : 2021-12-10
Category : Computers
ISBN : 9780738460222

Get Book

Getting Started with z/OS Data Set Encryption by Bill White,Cecilia Carranza Lewis,Eysha Shirrine Powers,David Rossi,Eric Rossman,Andy Coulsonr,Jacky Doll,Brad Habbershow,Thomas Liu,Ryan McCarry,Philippe Richard,Romoaldo Santos,Isabel Arnold,Kasper Lindberg,IBM Redbooks Pdf

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Implementing IBM Spectrum Virtualize software only

Author : Peter Mescher,John Sexton,Megan Gilge,IBM Redbooks
Publisher : IBM Redbooks
Page : 90 pages
File Size : 42,6 Mb
Release : 2017-05-19
Category : Computers
ISBN : 9780738456102

Get Book

Implementing IBM Spectrum Virtualize software only by Peter Mescher,John Sexton,Megan Gilge,IBM Redbooks Pdf

This IBM® RedpaperTM publication provides a broad understanding of IBM Spectrum VirtualizeTM software only and how it fits into to the IBM SAN Volume Control and IBM Storwize® families. It also provides use cases for cloud, Cloud Service Provider (CSP), and Managed Service Provider (MSP) implementations. This publication helps storage and networking administrators install, tailor, and configure IBM Spectrum Virtualize software only. It also provides a detailed description of supported hardware and troubleshooting tips. In April 2017, this paper was updated to include information about Version 7.8.1 and Supermicro SYS-2028U-TRTP+ server implementation.

Quality in the Era of Industry 4.0

Author : Kai Yang
Publisher : John Wiley & Sons
Page : 356 pages
File Size : 49,7 Mb
Release : 2024-01-24
Category : Technology & Engineering
ISBN : 9781119932444

Get Book

Quality in the Era of Industry 4.0 by Kai Yang Pdf

Enables readers to use real-world data from connected devices to improve product performance, detect design vulnerabilities, and design better solutions Quality in the Era of Industry 4.0 provides an insightful guide in harnessing user performance and behavior data through AI and other Industry 4.0 technologies. This transformative approach enables companies not only to optimize products and services in real-time, but also to anticipate and mitigate likely failures proactively. In a succinct and lucid style, the book presents a pioneering framework for a new paradigm of quality management in the Industry 4.0 landscape. It introduces groundbreaking techniques such as utilizing real-world data to tailor products for superior fit and performance, leveraging connectivity to adapt products to evolving needs and use-cases, and employing cutting-edge manufacturing methods to create bespoke, cost-effective solutions with greater efficiency. Case examples featuring applications from the automotive, mobile device, home appliance, and healthcare industries are used to illustrate how these new quality approaches can be used to benchmark the product’s performance and durability, maintain smart manufacturing, and detect design vulnerabilities. Written by a seasoned expert with experience teaching quality management in both corporate and academic settings, Quality in the Era of Industry 4.0 covers sample topics such as: Evolution of quality through industrial revolutions, from ancient times to the first and second industrial revolutions Quality by customer value creation, explaining differences in producers, stakeholders, and customers in the new digital age, along with new realities brought by Industry 4.0 Data quality dimensions and strategy, data governance, and new talents and skill sets for quality professionals in Industry 4.0 Automated product lifecycle management, predictive quality control, and defect prevention using technologies like smart factories, IoT, and sensors Quality in the Era of Industry 4.0 is a highly valuable resource for product engineers, quality managers, quality engineers and quality consultants, industrial engineers, and systems engineers who wish to make a participatory approach towards data-driven design, economical mass-customization, and late differentiation.

IBM Software for SAP Solutions

Author : Yaro Dunchych,Peter Bahrs,Khirallah Birkler,Bernd Eberhardt,Navneet Goyal,James Hunter,Derek Jennings,Joe Kaczmarek,Michel Laaroussi,Michael Love,Stefan Momma,Nick Norris,Martin Oberhofer,Manfred Oevers,Paul Pacholski,Andrew Stalnecker,Jörg Stolzenberg,Pierre Valiquette,IBM Redbooks
Publisher : IBM Redbooks
Page : 352 pages
File Size : 41,9 Mb
Release : 2015-09-29
Category : Computers
ISBN : 9780738441047

Get Book

IBM Software for SAP Solutions by Yaro Dunchych,Peter Bahrs,Khirallah Birkler,Bernd Eberhardt,Navneet Goyal,James Hunter,Derek Jennings,Joe Kaczmarek,Michel Laaroussi,Michael Love,Stefan Momma,Nick Norris,Martin Oberhofer,Manfred Oevers,Paul Pacholski,Andrew Stalnecker,Jörg Stolzenberg,Pierre Valiquette,IBM Redbooks Pdf

SAP is a market leader in enterprise business application software. SAP solutions provide a rich set of composable application modules, and configurable functional capabilities that are expected from a comprehensive enterprise business application software suite. In most cases, companies that adopt SAP software remain heterogeneous enterprises running both SAP and non-SAP systems to support their business processes. Regardless of the specific scenario, in heterogeneous enterprises most SAP implementations must be integrated with a variety of non-SAP enterprise systems: Portals Messaging infrastructure Business process management (BPM) tools Enterprise Content Management (ECM) methods and tools Business analytics (BA) and business intelligence (BI) technologies Security Systems of record Systems of engagement The tooling included with SAP software addresses many needs for creating SAP-centric environments. However, the classic approach to implementing SAP functionality generally leaves the business with a rigid solution that is difficult and expensive to change and enhance. When SAP software is used in a large, heterogeneous enterprise environment, SAP clients face the dilemma of selecting the correct set of tools and platforms to implement SAP functionality, and to integrate the SAP solutions with non-SAP systems. This IBM® Redbooks® publication explains the value of integrating IBM software with SAP solutions. It describes how to enhance and extend pre-built capabilities in SAP software with best-in-class IBM enterprise software, enabling clients to maximize return on investment (ROI) in their SAP investment and achieve a balanced enterprise architecture approach. This book describes IBM Reference Architecture for SAP, a prescriptive blueprint for using IBM software in SAP solutions. The reference architecture is focused on defining the use of IBM software with SAP, and is not intended to address the internal aspects of SAP components. The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. However, there are several other architectural domains which are not included in the book. This is not to imply that these other architectural domains are not important or are less important, or that IBM does not offer a solution to address them. It is only reflective of time constraints, available resources, and the complexity of assembling a book on an extremely broad topic. Although more content could have been added, the authors feel confident that the scope of architectural material that has been included should provide organizations with a fantastic head start in defining their own enterprise reference architecture for many of the important architectural domains, and it is hoped that this book provides great value to those reading it. This IBM Redbooks publication is targeted to the following audiences: Client decision makers and solution architects leading enterprise transformation projects and wanting to gain further insight so that they can benefit from the integration of IBM software in large-scale SAP projects. IT architects and consultants integrating IBM technology with SAP solutions.

Research Anthology on Business Aspects of Cybersecurity

Author : Management Association, Information Resources
Publisher : IGI Global
Page : 698 pages
File Size : 55,9 Mb
Release : 2021-10-29
Category : Computers
ISBN : 9781668436998

Get Book

Research Anthology on Business Aspects of Cybersecurity by Management Association, Information Resources Pdf

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution

Author : Boudhayan Chakrabarty,Sandeep R Patil,Shashank Shingornikar,Ashish Kothekar,Praphullachandra Mujumdar,Smita Raut,Digvijay Ukirde,IBM Redbooks
Publisher : IBM Redbooks
Page : 68 pages
File Size : 42,7 Mb
Release : 2021-09-13
Category : Computers
ISBN : 9780738460017

Get Book

Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution by Boudhayan Chakrabarty,Sandeep R Patil,Shashank Shingornikar,Ashish Kothekar,Praphullachandra Mujumdar,Smita Raut,Digvijay Ukirde,IBM Redbooks Pdf

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration.

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Author : Axel Buecker,Saritha Arunkumar,Brian Blackshaw,Martin Borrett,Peter Brittenham,Jan Flegr,Jaco Jacobs,Vladimir Jeremic,Mark Johnston,Christian Mark,Gretchen Marx,Stefaan Van Daele,Serge Vereecke,IBM Redbooks
Publisher : IBM Redbooks
Page : 240 pages
File Size : 40,9 Mb
Release : 2014-02-06
Category : Computers
ISBN : 9780738437897

Get Book

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security by Axel Buecker,Saritha Arunkumar,Brian Blackshaw,Martin Borrett,Peter Brittenham,Jan Flegr,Jaco Jacobs,Vladimir Jeremic,Mark Johnston,Christian Mark,Gretchen Marx,Stefaan Van Daele,Serge Vereecke,IBM Redbooks Pdf

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

Securing Your Cloud: IBM Security for LinuxONE

Author : Lydia Parziale,Edi Lopes Alves,Klaus Egeler,Karen Medhat Fahmy,Felipe Cardeneti Mendes,Maciej Olejniczak,IBM Redbooks
Publisher : IBM Redbooks
Page : 256 pages
File Size : 50,7 Mb
Release : 2019-08-01
Category : Computers
ISBN : 9780738457949

Get Book

Securing Your Cloud: IBM Security for LinuxONE by Lydia Parziale,Edi Lopes Alves,Klaus Egeler,Karen Medhat Fahmy,Felipe Cardeneti Mendes,Maciej Olejniczak,IBM Redbooks Pdf

As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.

IBM Storage Networking c-type FICON Implementation Guide

Author : William White,Aubrey Applewhaite,Mike Blair,Gary Fisher,Gavin O'Reilly,Lyle Ramsey,Fausto Vaninetti,IBM Redbooks
Publisher : IBM Redbooks
Page : 452 pages
File Size : 55,5 Mb
Release : 2022-01-11
Category : Computers
ISBN : 9780738460215

Get Book

IBM Storage Networking c-type FICON Implementation Guide by William White,Aubrey Applewhaite,Mike Blair,Gary Fisher,Gavin O'Reilly,Lyle Ramsey,Fausto Vaninetti,IBM Redbooks Pdf

The next-generation IBM® c-type Directors and switches for IBM Storage Networking provides high-speed Fibre Channel (FC) and IBM Fibre Connection (IBM FICON®) connectivity from the IBM Z® platform to the storage area network (SAN) core. It enables enterprises to rapidly deploy high-density virtualized servers with the dual benefit of higher bandwidth and consolidation. This IBM Redpaper Redbooks publication helps administrators understand how to implement or migrate to an IBM c-type SAN environment. It provides an overview of the key hardware and software products, and it explains how to install, configure, monitor, tune, and troubleshoot your SAN environment.