Designing for security
In this chapter, we describe the unique security risks introduced by mobile devices and discuss the various steps that you can use to address these risks. We review the security solutions that can be used to secure mobile access to System z.
We compare several System z mobile security topologies:
Using IBM Worklight security
DataPower as a policy enforcement point
z/OS Connect
DataPower as a reverse proxy for Worklight server
DataPower XI50z as a second security layer
IBM Security Access Manager as a policy enforcement ...

Get IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.