The apple of my eye: Pervasive encryption with IBM Z

Share this post:

One of my absolute favorite things to do this time of year where I live in Ohio (besides raking leaves—just kidding) is to head out east about 20 miles to go apple picking. Apple pie, apple crisp, baked apples, spiced apples, apple butter, applesauce… there are endless possibilities.

Everybody has their favorite apple but mine happens to be a type of apple that’s hard and crunchy and sweet all at the same time, and is great for both eating and cooking. It’s called Melrose, and it can’t be beat. The best part of picking Melrose apples is watching my black lab, who happens to adore apples, wander through the orchard, thinking he’s in heaven… though I’m always hoping he hasn’t eaten too many when we make the 20-mile trip back home.

On our annual excursion, we pick many, many pounds of apples. We do this for some very good reasons: We don’t have the time or want the expense of making the trip more than once. We also don’t want to risk starting a favorite recipe and running out of apples! We are achieving economies of scale with less risk.

Which brings me to pervasive encryption.

IBM Z pervasive encryption is a data-centric approach to information security—a transparent and consumable approach to enable extensive encryption of data “in flight” and “at rest” to substantially simplify and reduce the costs of protecting data and achieving compliance mandates.

With IBM z14 and pervasive encryption, you can:

  • Encrypt all of your data that’s associated with an application or database on IBM Z, whether at rest or in flight.
  • Reduce the cost and complexity associated with implementing and maintaining encryption since no changes to the applications themselves are required.
  • Transition from unencrypted to encrypted databases without disrupting business operations.
  • Drastically simplify compliance by quickly demonstrating to auditors that all data is protected.

With pervasive encryption, we are moving from selectively encrypting data to encrypting everything, which enables us to both achieve economies of scale and reduce risk. Just like with my apple picking.

Somewhere now there exists my name with the fact that my favorite apple is the Melrose. And I want to be really sure that doesn’t go anywhere.

More Services stories

IBM z15 sets a new cloud security standard

Encryption, Mainframes, Multicloud

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. On September 12, 2019, in New York City, IBM set a new more

Address customer data privacy and protection concerns with encryption everywhere

Data centers, Data security, Mainframes

Data privacy and protection remain top boardroom and C-suite issues. The data breach threat still looms large: 59 percent of businesses experienced a data breach caused by a vendor or third party in 2018[1]. As organizations migrate workloads to hybrid multicloud environments, they must ensure that the data within these environments is effectively protected. Consumers more

Designing an efficient SAP HANA on Power Systems landscape

IBM Systems Lab Services, Power servers, Power Systems

Most workloads in data centers today are virtualized to drive up system utilization. This results in several benefits for your business: fewer systems needed, a decrease in network/SAN ports, reduced floor space, power and cooling, and most importantly reduced costs for IT management. With SAP HANA on IBM Power Systems, you can have more flexibility more