Where to put my diamond earrings? I stared intently at the safe in my hotel room. And once again I pondered what the right answer was. Do I take the few valuables I own and place them in the safe, figure out what code to use, hope I remember my code, and hope the safe actually works? Or should I just hide them among my other belongings and hope for the best?
(This isn’t just free-floating anxiety by the way. I was once at a conference where a locksmith had to blow up the safe of the keynote presenter.)
The key question is, are we really better off using the safe at all rather than hiding something valuable anywhere else in the room? Or leaving it on a lounge chair at the pool while we swim — under a towel, of course?
The safe is basically shouting out to everyone: HERE IS WHERE ALL OF MY VALUABLES ARE!
With IBM z14, you can now encrypt everything. Pervasive encryption enables you to encrypt data at the database, data set and disk level, with no changes to applications. Each app will have an internal encryption-decryption mechanism, allowing you to apply cryptography without altering the app itself. So, the sensitive data basically does not have a target on its back.
From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. An idea is only an idea until someone believes in it. A groundbreaking vision ...read more
IBM has been recognized as a Leader in the 2019 Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. This is the eighth report in a row, and 13 out of 14 years lifetime, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions for both its completeness of ...read more
Data privacy and protection remain top boardroom and C-suite issues. The data breach threat still looms large: 59 percent of businesses experienced a data breach caused by a vendor or third party in 2018. As organizations migrate workloads to hybrid multicloud environments, they must ensure that the data within these environments is effectively protected. Consumers ...read more