data encryption

IBM LinuxONE III: Built for the cloud with privacy and security

Encryption, LinuxONE solutions, Multicloud

From talking to businesses and clients, we know that as enterprises embrace a hybrid multicloud strategy, they often struggle finding ways to address concerns around security, scalability, flexibility of the platform they choose, and the resiliency required to prevent downtime. When developing the newest generation of IBM LinuxONE™ we kept these concerns top-of-mind. We addressed ...read more


Is your smartphone data safer than your enterprise data?

Data security, Encryption, Linux systems...

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only ...read more


Three ways to collaborate to improve cybersecurity

Data security, Encryption, Linux systems...

The stakes are high in enterprise security. Data breaches can damage your organization’s reputation and result in significant costs (USD 3.86 million for every breach on average according to this Ponemon Cost of a Data Breach study). They can also destroy customer trust. Recent research has found that more than 78 percent of customers would ...read more


Data security threats: Staying ahead of the curve

Cloud computing, Data security, Encryption...

Data loss of some magnitude is almost a certainty in any enterprise. The loss can be due to anything from a minor mishap by a user, a stolen laptop or a system-wide cyberattack, to a catastrophic natural disaster that wipes out an entire data center. A lot of data security breaches tend to get the ...read more


No worries with pervasive encryption

Data security, Encryption, Mainframes...

Where to put my diamond earrings? I stared intently at the safe in my hotel room. And once again I pondered what the right answer was. Do I take the few valuables I own and place them in the safe, figure out what code to use, hope I remember my code, and hope the safe ...read more


Data protection in the new era of the data-driven economy

Cloud computing, Storage

As I was following up on GDPR requirements and the implications, it got me thinking into what it means for traditional backup and data protection functions within IT organizations. Up until now, data protection has been an important but often IT-level task. However, in the new data-driven economy, data protection is now a business objective, ...read more


Three IBM Z security insights from Think 2018

Cloud computing, Data security, Encryption...

The data breach threat is real. Recent high-profile breaches have focused boardroom attention on this issue. Data breaches are expensive, costing $3.6 million on average[1]. And they’re increasingly likely: an organization has a 28 percent chance of being breached in the next 24 months.[2] To stay out of the data breach headlines, organizations require security ...read more


Pervasive encryption: The new standard in data protection

Data security, Encryption, Mainframes...

Virtually every business faces the daunting challenges of protecting of their customers’ trust and their data, complying with increasingly stringent regulatory and compliance requirements, managing challenging IT environments, and keeping costs down. IBM Z offers the most secure platform, and with carefully-defined security policies your data can be kept very safe.  Even so, there may ...read more


Cut through the hype of enterprise data encryption

Big data & analytics, Data security, Encryption...

Encryption is experiencing growing interest and scrutiny. It is increasingly positioned as a technology that addresses the triple threat driving the security landscape: Supporting regulatory compliance Counter-acting the continually evolving threat landscape Limiting enterprise exposure to the risk posed by digital transformation Ideally, enterprise data encryption would be a hygiene behavior, perceived as a fundamental ...read more