Encryption

New content to maximize your IBM Z investment, May 2019

Encryption, Mainframes, Security

Risks are inherent in any IT environment. Your challenge is to minimize that risk and build a cloud strategy that ensures resiliency, reliability and security to protect your business and customers. Your use of IBM Z secured infrastructure within your cloud strategy can help drive the transformation that you need to stay ahead of the ...read more


A brief history of airline security, hijackings and metal detectors

Data security, Encryption, Security

Between May 1961 and the end of 1972, there were 159 aircraft hijackings[1] in United States airspace. This time period is often referred to as the golden age of airline hijacking. According to Brendan Koerner, author of the 2013 book The Skies Belong to Us, the majority of those “were between ’68 and ’72, a ...read more


Address your data security challenges with pervasive encryption

Data security, Encryption, Linux systems...

As an IT manager, you likely face several critical challenges related to your enterprise data: Internal and external data breach threats necessitate protecting all potentially sensitive data. Yet identifying and classifying this data can be a challenge. Encrypting data at the field level often requires significant costs, resources and application changes – yet still leaves ...read more


Is your smartphone data safer than your enterprise data?

Data security, Encryption, Linux systems...

More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, especially considering that encrypted data is rarely successfully attacked.[ii] Yet most organizations today are encrypting only ...read more


Three ways to collaborate to improve cybersecurity

Data security, Encryption, Linux systems...

The stakes are high in enterprise security. Data breaches can damage your organization’s reputation and result in significant costs (USD 3.86 million for every breach on average according to this Ponemon Cost of a Data Breach study). They can also destroy customer trust. Recent research has found that more than 78 percent of customers would ...read more


DBaaS + Security @ MongoDB World

Data security, Encryption, Linux systems...

How important are automation and security for your enterprise data? While today’s business leaders want to automate tasks to eliminate human errors and security breaches, they don’t want to spend time on technical details. Managing databases in the traditional way requires a lot of highly-specialized technical knowledge, and DB admins must know and handle nearly ...read more


IBM and SUSE Linux Enterprise 15 deliver breakthrough security

Cloud computing, Encryption, Linux systems...

The latest major release of SUSE Linux Enterprise includes improved security, performance and virtualization optimizations for IBM’s new z14 and LinuxONE servers. SUSE Linux Enterprise 15 is now available – focusing on simplifying traditional & containerized infrastructures and making IT more efficient. SUSE Linux Enterprise Server for z Systems and LinuxONE is part of the ...read more


Cloud infrastructure designed for your business model

Cloud computing, Data security, Encryption...

When we talk about cloud, one of the most important challenges for cloud service providers is changing the old thinking about protecting data. With all of the cyberattacks being launched on companies, there’s no doubt that security is extremely important. It’s even more important if we consider that data breaches can lead to the end ...read more


Data breaches: The threat is real

Data security, Encryption, IBM Systems Lab Services...

The threat is real. You see it in the newspaper headlines and on your TV news channel. As predicted years ago, data is now the new oil. As with any valuable resource, it has become the main target for criminal organizations. In the past, the threat came from burglars or spies. Now the threat is ...read more