Data security

Blockchain: How should you organize your peers?

The last time we communicated, we spoke about the types of users on a Blockchain network – and about Hyperledger in particular. Now, I would like to map this conversation to peers. As you may know, Hyperledger has three components: Membership services – which manages digital certificates and access, ordering service – which keeps the […]

Continue reading

Pt 3: Bringing data protection into the cognitive era

This is part three of a three-part blog post series on innovations in data protection. Read part one on the evolution of data protection here, and part two here, on the importance of snapshot management. Part three: The final piece of the puzzle The final piece of the data protection puzzle that IT professionals must […]

Continue reading

Pt 2: Bringing data protection into the cognitive era

This is part two of a three-part blog post series on innovations in data protection. Read part one on the evolution of data protection here. Part two: Snapshots, snapshot management and automation– the next step in data protection Snapshots are used as a means to recover a storage array to a point when the last […]

Continue reading

To protect and serve: New features in IBM Cloud Object Storage System

Organizations are challenged with meeting the demand for storing, protecting and distributing data that is being created in larger volumes, at a faster rate and in greater variety than ever before. Today, so much of this data being created is unstructured. It is being stored for longer periods of time to meet regulations and legal […]

Continue reading

IBM Spectrum Virtualize transforms IT with new hybrid cloud capabilities

When moving to a hybrid cloud strategy, the number one concern that initially worries many leaders is the question of security: “Is my data really secure in a public cloud?”  While security is still top-of-mind these days, there are new concerns that are beginning to surface as well.   Namely, how difficult and how disruptive will […]

Continue reading

Realizing the dream: Encrypting all mainframe data

The ability to encrypt all of the data for an entire application or database has been an unfulfilled dream of IT for quite some time. After all, nobody wants to be the next big name splashed across news headlines when a data breach takes place, or stiff regulatory penalties are assessed. These possibilities drive many […]

Continue reading

Bringing data protection into the cognitive era

This is part one of a three-part blog post series on innovations in data protection. Read part two here and part three here. Part one: The evolution of data protection Data protection has been a critical process for safeguarding information since the day these systems were developed. Just how data is protected has continually evolved […]

Continue reading

3 critical security issues for the modern enterprise

Security continues to be a top concern keeping IT leaders up at night. With good reason – the impact of security breaches can include remediation costs, reputation damage and reduced customer confidence. What can leaders do to protect their data without sacrificing business agility? In August 2017, IBM commissioned Forrester to conduct a survey of […]

Continue reading

Accelerate business insights on IBM Z

Competitive advantage today is based on immediate insight, trusted relationships and the ability to move with speed to engage with clients across multiple channels. To meet these goals, IBM recently introduced the IBM® z14™, the next generation of the world’s most powerful transaction system. It is capable of running more than 12 billion encrypted transactions […]

Continue reading