Data security

Spartan Group helps accelerate demand for digital asset-based products

Blockchain, Data security, LinuxONE solutions

Digital assets, particularly in the form of cryptocurrencies and tokens, have been the subject of a great deal of press coverage over the last 18-24 months. Research from Fidelity Investments suggests that 22 percent of institutional investors are already exposed to digital assets, with 40 percent being open to future investments.[1] These figures demonstrate an ...read more


Announcing IBM Cloud Hyper Protect DBaaS for MongoDB

Cloud computing, Data security, LinuxONE solutions

As business leaders look to leverage the cloud, enterprises in highly regulated industries are typically concerned about protecting confidential and sensitive customer data. We have seen that public reports of unauthorized user access, encryption details, or exposure of data by internal users have been rising at an alarming rate. Given the high average cost of ...read more


Using LinuxONE to transform and protect your business, May 2019

Data security, LinuxONE solutions, Security

Your transition to the cloud can only be successful if your data and your environment are secure. Your business, your customers and your partners depend on it. In addition, any interruption to your business can result in lost revenue, trust and ultimately reputation. At IBM, we are committed to providing solutions that maintain your data ...read more


A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


The Best of IBM Z and LinuxONE in the public and private cloud

Cloud servers, Data security, Hybrid cloud...

In our hybrid cloud world, IT leaders view choice and control as strategic assets when it comes to their infrastructure. But when deploying hybrid cloud strategies one of the biggest challenges for enterprise cloud adoption is security, often slowing down the digital transformation process. Concerns ranging from trust to data protection and compliance are top ...read more


Modern data protection innovations to fight cyber threats

Cloud computing, Cloud object storage, Data security...

In 2018, the average cost of a data security breach approached $3.9 million. But organizations that fully deployed security automation saved over $1.5 million per breach.[1] These metrics demonstrate the value of effective data protection and security solutions, and underscore the significance of recent data security-related announcements from IBM. “ESG’s research clearly shows that data ...read more


Security considerations for critical environments

Data security, Linux systems, LinuxONE solutions...

In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-authorized code as well as from denial of service attacks. The cost of data breaches ...read more


System security assessment for servers that support SAP HANA

Data security, IBM Systems Lab Services, Power servers...

Information is at the core of today’s digital business operations. As the value of your organization’s information grows, it can become the primary target for a breach. A data breach occurs when someone is allowed to read data without authorization to access it. Once hackers can read your data, they can steal or modify it. ...read more


Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more