encryption

Keep customer data secured, private and encrypted with the latest IBM Z enhancements

Data security, Mainframes, Servers

In my discussions with CIOs and CISOs in organizations around the globe, I’ve noticed a common concern. How can these organizations keep business and customer data private and protected as they transform for hybrid multicloud? As the volume and complexity of data sharing grows this concern is increasingly validated. According to the 2018 Third-Party Data ...read more


A passport to data-centric protection and privacy, pt 2

Data security, Encryption, Mainframes

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. Despite the challenges associated with breaches and growing hacker threats I discussed ...read more


Two industry firsts from IBM Z at the Think London event

Cloud servers, Data security, Mainframes

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. On the 16th of October IBM held their Think Summit in London ...read more


Better together: The IBM Z and LinuxONE ecosystem reacts to IBM’s latest announcement

Encryption, LinuxONE solutions, Mainframes

Today’s IBM Z is built to enable the cloud you want with the privacy and security you need. In this hybrid multicloud world, we collaborated with an ecosystem of over 700 Independent Software Vendors (ISVs) to deliver more than 4,000 applications bringing additional value to you. Several of these ISVs shared their perspective and offered their ...read more


Secure hybrid cloud with encryption everywhere on IBM z15

Hybrid cloud, Mainframes, Storage

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. Securing hybrid cloud environments is a shared responsibility. IT teams are looking ...read more


IBM z15 – The cloud you want with the privacy and security you need

Cloud computing, Encryption, Mainframes

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. I had the pleasure of attending the recent launch of the brand ...read more


Digital Asset Custody Services (DACS) aims to disrupt the digital assets market with a secured custody platform

Blockchain, Encryption, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.   A revolution in how consumers and businesses exchange value is underway right now. ...read more


The next “tick” of SUSE Linux Enterprise Server for IBM Z and LinuxONE

Linux on z, LinuxONE solutions, Mainframes

The working philosophy at Fort Vale is “continuous improvement” according to the UK-based engineering company deploying its new ERP system on SUSE Linux Enterprise Server and IBM LinuxONE. Continuous improvement is also a good theme for the next “tick” of SUSE Linux Enterprise Server – following the “tick-tock” approach that SUSE uses for releases. SLES ...read more


Security considerations for critical environments

Data security, Linux systems, LinuxONE solutions...

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches ...read more