Security

Using LinuxONE to transform and protect your business, May 2019

Data security, LinuxONE solutions, Security

Your transition to the cloud can only be successful if your data and your environment are secure. Your business, your customers and your partners depend on it. In addition, any interruption to your business can result in lost revenue, trust and ultimately reputation. At IBM, we are committed to providing solutions that maintain your data ...read more


New content to maximize your IBM Z investment, May 2019

Encryption, Mainframes, Security

Risks are inherent in any IT environment. Your challenge is to minimize that risk and build a cloud strategy that ensures resiliency, reliability and security to protect your business and customers. Your use of IBM Z secured infrastructure within your cloud strategy can help drive the transformation that you need to stay ahead of the ...read more


A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


The Best of IBM Z and LinuxONE in the public and private cloud

Cloud servers, Data security, Hybrid cloud...

In our hybrid cloud world, IT leaders view choice and control as strategic assets when it comes to their infrastructure. But when deploying hybrid cloud strategies one of the biggest challenges for enterprise cloud adoption is security, often slowing down the digital transformation process. Concerns ranging from trust to data protection and compliance are top ...read more


Modern data protection innovations to fight cyber threats

Cloud computing, Cloud object storage, Data security...

In 2018, the average cost of a data security breach approached $3.9 million. But organizations that fully deployed security automation saved over $1.5 million per breach.[1] These metrics demonstrate the value of effective data protection and security solutions, and underscore the significance of recent data security-related announcements from IBM. “ESG’s research clearly shows that data ...read more


Security considerations for critical environments

Data security, Linux systems, LinuxONE solutions...

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches ...read more


System security assessment for servers that support SAP HANA

Data security, IBM Systems Lab Services, Power servers...

Information is at the core of today’s digital business operations. As the value of your organization’s information grows, it can become the primary target for a breach. A data breach occurs when someone is allowed to read data without authorization to access it. Once hackers can read your data, they can steal or modify it. ...read more


Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more


New Container pricing enhancements bring pay-as-you-go model to z/OS

Cloud computing, Data centers, Data security...

Today’s IT is fast-paced and in constant evolution. For many clients, IBM Z® is at the center of their digital transformation. Utilizing this secure, flexible infrastructure with the agility of public cloud and the security and resiliency of a private cloud, clients can accelerate the deployment of new services to help meet market demands. We continue to deliver security, development and ...read more