CIO's Corner

A New Era of Data Protection

Share this post:

A new IBM Z14 Mainframe has been announced. You can say, what has this to do with Cyber security. Well it has a lot to do with Cyber Security. When you listen, and look around you in the news we see that there are a lot of data breaches. To put this in a bit more perspective of the more than nine billion data records lost or stolen since 2013, only four percent were encrypted, making the majority of such data vulnerable to organized cybercrime rings, state actors and employees misusing access to sensitive information. Encryption is often largely absent in corporate and cloud data centers. This is because current solutions for data encryption can dramatically degrade performance (and thus user experience), and can be too complex and expensive to manage for regulatory compliance.

This IBM Z system was designed with 150 clients, including Chief Security Officers and security experts, who asked IBM to take on this challenge. Why is this such an important re-invention? It is a data encryption breakthrough making we are making it possible to protect all data/all the time for entire cloud services, applications and data bases.

Upcoming regulations such as the EU’s General Data Protection Regulation (GDPR) will increase data compliance requirements for organizations doing business in Europe starting next year. This new Z system it is deeply integrated with IBM Security software, designed to automate and streamline security and compliance processes. This to help clients build trust with consumers and comply with new standards.

There is some great new technology under the hood that needs to be mentioned.

With a 400% increase in silicon dedicated to cryptographic algorithms (over 6 billion transistors dedicated to cryptography in a full system) and reworking of its software stack, this is the first system capable of encrypting all data associated with any application, cloud service or database all the time.

This is an important breakthrough and you can learn more about IBM Z Enterprise Security by clicking this link.

 

Global Executive Security Advisor, IBM Security X-Force Command

More CIO's Corner stories

Security Summit: zo ziet de cyberveiligheid van de toekomst eruit

  Het is tijd om de regels van cyberveiligheid drastisch te veranderen. De digitale wereld blijft innoveren, en dat maakt de kans op dreigingen en datalekken reëler. Tijdens IBM’s Security Summit geven beveiligingsexperten en andere veiligheidsprofessionals hun kijk op de nieuwe realiteit. Is jouw organisatie klaar voor een nieuwe denkwijze? Digitale veiligheid staat voor veel […]

Continue reading

Beleef je ergste dag in IBM’s mobiele cyber range

Stel je voor. Je huis staat in brand. Met veel misbaar komt de brandweerauto de straat binnen rijden en vijf mannen stappen uit. Ze dragen niet de kleren die je zou verwachten. Ook lijken ze niet echt haast te maken. En eenmaal bij de voordeur zeggen ze het volgende: “Goedenavond, ik ben Peter en ik […]

Continue reading

Hoe implementeer je Identity Governance and Administration (IGA) optimaal?

Identity Governance & Administration (IGA) is uitgegroeid tot een essentiële schakel binnen veel organisaties. De manier waarop ze IGA implementeren blijkt echter sterk afhankelijk van het type activiteit en het specialisme van de IT-afdeling. Heliview en IBM brachten diverse specialisten samen voor een rondetafelgesprek. De inbreng van onder meer security managers, special risk managers en […]

Continue reading