pervasive encryption

Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more


Is your smartphone data safer than your enterprise data?

Data security, Encryption, Linux systems...

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only ...read more


DBaaS + Security @ MongoDB World

Data security, Encryption, Linux servers...

How important are automation and security for your enterprise data? While today’s business leaders want to automate tasks to eliminate human errors and security breaches, they don’t want to spend time on technical details. Managing databases in the traditional way requires a lot of highly-specialized technical knowledge, and DB admins must know and handle nearly ...read more


Data breaches: The threat is real

Data security, Encryption, IBM Systems Lab Services...

The threat is real. You see it in the newspaper headlines and on your TV news channel. As predicted years ago, data is now the new oil. As with any valuable resource, it has become the main target for criminal organizations. In the past, the threat came from burglars or spies. Now the threat is ...read more


The IBM Z cloud-ready data center dream is now available

Cloud computing, Data centers, Encryption...

Today IBM announces the availability of its cloud-ready IBM z14 based on a single-frame design, originally unveiled in April 2018. In response to the desires of cloud service providers, managed service providers and enterprise customers, the now broadly-available IBM Z mainframe features a 19-inch industry-standard rack that fits neatly onto just two data center floor ...read more


No worries with pervasive encryption

Data security, Encryption, Mainframes...

Where to put my diamond earrings? I stared intently at the safe in my hotel room. And once again I pondered what the right answer was. Do I take the few valuables I own and place them in the safe, figure out what code to use, hope I remember my code, and hope the safe ...read more


IBM unveils new cloud-ready mainframe based on single-frame design

Big data & analytics, Blockchain, Cloud computing...

Today, IBM announced its newest cloud-ready mainframes — the IBM z14 Model ZR1 and IBM LinuxONE Rockhopper II, the latest additions to its family of servers announced in 2017. The new systems feature a 19-inch industry standard, single-frame design allowing for easy placement into cloud data centers and for private cloud environments. This will bring ...read more


Three IBM Z security insights from Think 2018

Cloud computing, Data security, Encryption...

The data breach threat is real. Recent high-profile breaches have focused boardroom attention on this issue. Data breaches are expensive, costing $3.6 million on average[1]. And they’re increasingly likely: an organization has a 28 percent chance of being breached in the next 24 months.[2] To stay out of the data breach headlines, organizations require security ...read more


Who do you trust with your IT security?

Data security, Encryption, Hybrid cloud...

Security is a word that’s used to cover many aspects of IT, and it’s a top concern for organizations today, but there’s another important word related to the vendors of IT security products and solutions that safeguard your business: trust. Securing your business data and applications from malicious access or tampering rests on trust in ...read more