Security

Four ways to stem the tide of rising cybersecurity risks

Data security, IBM Systems Lab Services, Power Systems

One of the greatest challenges in the IT industry is staying ahead of the cybercriminal. This is no easy task. The 2019 Cost of a Data Breach Report, conducted by the Ponemon Institute and sponsored by IBM Security, indicates that the chances of experiencing a data breach have increased from 22.6 percent in 2014 to ...read more


Two industry firsts from IBM Z at the Think London event

Cloud servers, Data security, Mainframes

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. On the 16th of October IBM held their Think Summit in London ...read more


Cyber-resiliency best practices: Staying prepared for cyberattack

Data security, IBM Systems Lab Services, Storage

It seems that major headlines every week focus on data breaches or cyber events against well-known, reputable businesses or government agencies. Cyberattacks are becoming more prolific and sophisticated, so it’s no longer a question of if it will affect your organization, but when. Certain cyberattacks such as ransomware can cripple an organization, if not shut ...read more


A tale of two security models

Cloud computing, Data security, Encryption

The approach of security as a choice In your journey to cloud, there are many approaches to securing your workloads. One approach is very common across a variety of cloud vendors: You choose how yours is secured. In a world where a breach of personal information can cost your enterprise millions of dollars in fines ...read more


Better together: The IBM Z and LinuxONE ecosystem reacts to IBM’s latest announcement

Encryption, LinuxONE solutions, Mainframes

Today’s IBM Z is built to enable the cloud you want with the privacy and security you need. In this hybrid multicloud world, we collaborated with an ecosystem of over 700 Independent Software Vendors (ISVs) to deliver more than 4,000 applications bringing additional value to you. Several of these ISVs shared their perspective and offered their ...read more


IBM z15 sets a new cloud security standard

Encryption, Mainframes, Multicloud

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM. On September 12, 2019, in New York City, IBM set a new ...read more


Cognition Foundry lights a fire under startups by giving them access to enterprise technology

Data security, LinuxONE solutions, Modern data platforms

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these blogs are their own, and do not necessarily reflect the views of IBM. An idea is only an idea until someone believes in it. A groundbreaking vision ...read more


IBM is recognized as a “Leader” in 2019 Gartner Magic Quadrant for Data Center Backup and Recovery Solutions

Cloud object storage, Data security, Storage

IBM has been recognized as a Leader in the 2019 Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. This is the eighth report in a row, and 13 out of 14 years lifetime, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions for both its completeness of ...read more


Address customer data privacy and protection concerns with encryption everywhere

Data centers, Data security, Mainframes

Data privacy and protection remain top boardroom and C-suite issues. The data breach threat still looms large: 59 percent of businesses experienced a data breach caused by a vendor or third party in 2018[1]. As organizations migrate workloads to hybrid multicloud environments, they must ensure that the data within these environments is effectively protected. Consumers ...read more