Data security

A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


The Best of IBM Z and LinuxONE in the public and private cloud

Cloud servers, Data security, Hybrid cloud...

In our hybrid cloud world, IT leaders view choice and control as strategic assets when it comes to their infrastructure. But when deploying hybrid cloud strategies one of the biggest challenges for enterprise cloud adoption is security, often slowing down the digital transformation process. Concerns ranging from trust to data protection and compliance are top ...read more


Modern data protection innovations to fight cyber threats

Cloud computing, Cloud object storage, Data security...

In 2018, the average cost of a data security breach approached $3.9 million. But organizations that fully deployed security automation saved over $1.5 million per breach.[1] These metrics demonstrate the value of effective data protection and security solutions, and underscore the significance of recent data security-related announcements from IBM. “ESG’s research clearly shows that data ...read more


Security considerations for critical environments

Data security, Linux systems, LinuxONE solutions...

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches ...read more


System security assessment for servers that support SAP HANA

Data security, IBM Systems Lab Services, Power servers...

Information is at the core of today’s digital business operations. As the value of your organization’s information grows, it can become the primary target for a breach. A data breach occurs when someone is allowed to read data without authorization to access it. Once hackers can read your data, they can steal or modify it. ...read more


Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more


New Container pricing enhancements bring pay-as-you-go model to z/OS

Cloud computing, Data centers, Data security...

Today’s IT is fast-paced and in constant evolution. For many clients, IBM Z® is at the center of their digital transformation. Utilizing this secure, flexible infrastructure with the agility of public cloud and the security and resiliency of a private cloud, clients can accelerate the deployment of new services to help meet market demands. We continue to deliver security, development and ...read more


A sneak peek of the Think 2019 Infrastructure campus

AI, Big data & analytics, Cloud computing...

“It can be hard to keep up with all of the technology shifts and changes these days. IBM Think helps me because it addresses all of them including AI, cloud, analytics, infrastructure, security, and even nascent trends like quantum computing!” – Craig S. Mullins, President & Principal Consultant, Mullins Consulting Inc. Think 2019 is fast ...read more


IBM Cloud Object Storage and CTERA-secured remote file access and easy backup of remote files

Cloud computing, Cloud object storage, Data centers...

The cloud is changing the landscape of IT organizations around the globe. As companies drive to a more digital workplace and the amount of data continues to grow, the ease of access and the simplicity of management becomes increasingly important to organizations. Enterprises also tend to require security and control to help protect their data. ...read more