IBM Security zSecure Alert
In this chapter, we introduce the features, architectures, and processing of zSecure Alert in detail. To help you better understand the zSecure Alert functions and use, we also provide implementation suggestions and integration guidelines about how to achieve effective security monitoring. We discuss a more detailed configuration scenario in Chapter 14, “Implementation phase II” on page 265.
This chapter covers the following topics: