Security

Phoenix Systems and Kore Technologies bring bank-grade security to blockchain-based digital assets

Blockchain, Data security, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. As blockchain technology flourishes, so do new protocols for managing currency exchanges, financial transactions, ...read more


Infibeam Avenues introduces revolutionary blockchain-as-a-service offering in India on IBM LinuxONE

Blockchain, Data security, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. As the Indian economy continues to grow, the role of the solution provider is ...read more


IBM is transforming data storage for media and entertainment

Data security, Storage, Tape and virtual tape storage

Disruptions in media and entertainment have been occurring at a rapid pace over the past few years and many organizations are still struggling with optimizing their IT infrastructure for new data requirements. With growth in capacity, new larger file formats, keeping more data online for business opportunities, and the growing use of AI, organizations are ...read more


Digital Asset Custody Services (DACS) aims to disrupt the digital assets market with a secured custody platform

Blockchain, Encryption, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.   A revolution in how consumers and businesses exchange value is underway right now. ...read more


Protection against malware: IBM AIX has your back

IBM Systems Lab Services, Power Systems, Security

“How can we protect our IBM AIX systems from malware attacks?” As a cyber security consultant, I come across this question more than any other when it comes to securing servers running IBM AIX. Most security breaches today are based on malware attacks, especially in banking sector. The infamous FASTCash malware has infected many banks’ ...read more


The next big leaps for IBM modern data protection

Data security, Multicloud, Storage

Recent analyst research indicates why hybrid multicloud support is becoming increasingly important. According to a 2019 ESG report [1], 67 percent of organizations surveyed currently use public cloud services in their data protection environment. Among those companies, on average 26 percent of their protection environments (measured by amount of data) are housed in the cloud, ...read more


Riding LinuxONE Systems in the hybrid cloud

Data security, LinuxONE solutions, Open source

Alf Thunberg often rides a motorcycle to the office. He repairs his two motorcycles himself, and rides the vintage bikes to work, wearing his helmet and a business suit. He’s taking an all-in-one approach to his daily travels, reducing unnecessary costs wherever possible. He applies the same approach to deploy client applications on scalable data ...read more


Spartan Group helps accelerate demand for digital asset-based products

Blockchain, Data security, LinuxONE solutions

Digital assets, particularly in the form of cryptocurrencies and tokens, have been the subject of a great deal of press coverage over the last 18-24 months. Research from Fidelity Investments suggests that 22 percent of institutional investors are already exposed to digital assets, with 40 percent being open to future investments.[1] These figures demonstrate an ...read more


Announcing IBM Cloud Hyper Protect DBaaS for MongoDB

Cloud computing, Data security, LinuxONE solutions

As business leaders look to leverage the cloud, enterprises in highly regulated industries are typically concerned about protecting confidential and sensitive customer data. We have seen that public reports of unauthorized user access, encryption details, or exposure of data by internal users have been rising at an alarming rate. Given the high average cost of ...read more