Skip to main content

Sort by
Articles

Kubernetes Container Security Best Practices With Red Hat Advanced Cluster Security for Kubernetes

Cayla Jenkins

August 30, 2021

As we work with organizations who are adopting containers as part of their software development strategy, we have seen container security become a challenge for many, and at times an aftersight. This is not on purpose, but primarily a result of the vast differences between the new technology of containers versus the virtualization model many […]

Articles

3 Points to Consider When Modernizing IBM Z

John Shuman

April 25, 2019

IT executives are increasingly under pressure to manage and create disruption. Application development is proceeding at a fantastic rate and users are clamoring for broad new capabilities. Major databases for large corporations end up in the back end on secure, high-speed IBM Z* servers. But many of them are running applications developed decades ago. Enter […]

Articles

Streamline Regulatory Compliance With a Hybrid Cloud

Kristin Lewotsky

April 1, 2019

In today’s business climate, just delivering goods and services to customers is no longer enough. Amid an ongoing stream of security breaches, countries, regions and industries around the globe have established regulations governing data protection—data privacy and data security. As a result, enterprises need to demonstrate and maintain compliance around egulations such as the European […]

Articles

Compliance Requires Layered Security

Kristin Lewotsky

March 1, 2019

Businesses need to worry about more than just developing products and services for their customers. They need to deliver those products and services while complying with a plethora of standards and regulations governing how data can be collected, processed, stored and transferred. These standards range from highly specific documents covering niche markets like healthcare, to […]

Articles

IBM Infrastructure Plays a Critical Role in Cloud, AI and Security

Evelyn Hoover

February 1, 2019

Cloud, artificial intelligence (AI) and security all have underpinnings in infrastructure—the servers, storage and software that power an organization. A purpose-built architecture is critical to achieving the performance needed for current and future business requirements. “Technology alone can’t transform a company, but it’s a very essential ingredient in business transformation,” says Tom Rosamilia, senior vice […]

Articles

The Privacy Regulation Inflection Point

Richard Hogg

January 1, 2019

Congratulations! We’re all in a growth area—the ever expanding footprint of privacy compliance regulations around the world. We’re now about eight months into General Data Protection Regulation (GDPR) being live, and the world is still turning. Up ahead, we see the California Consumer Privacy Act due to go live in early 2020, along with Brazil’s […]

Articles

DevSecOps Matters for the Mainframe

Kristin Lewotsky

January 1, 2019

Today’s customers want new services and they want them now. To remain competitive and keep up with customer needs, organizations are seeking ways to innovate rapidly around some of their most valuable assets—customer data and enterprise data. At one time, the mainframe was viewed as an isolated system. Data was often moved to a different […]

Articles

Creating a Self-Managing Mainframe

John McKenny

September 1, 2018

Hybrid IT environments, along with IT leaders and their teams, are facing more challenges than ever because of digital transformation efforts to add new or improved services for customers. The challenges are coming from all sides, and IT teams are often backed into a corner, left to respond reactively to dynamic changes, customer situations, threats […]

Articles

The Benefits of Analytics and Machine Learning on IBM Z

September 1, 2018

Enterprises have vast amounts of high-value, sensitive data on IBM Z*. With recent advances in machine learning technology, it’s the right time to extract key insights from this data and monetize it. Given its sensitive nature, it only makes sense to leverage that data in place. Enterprises can also minimize costly data movement and maintain […]

Articles

The GDPR Is New, but the Requirements Aren’t

George Faucher

July 1, 2018

Data breach studies are revealing shocking statistics. In a 2017 study (ibm.co/2Bir60B), IBM and Ponemon Institute found that the average time it took to discover a data breach was 191 days. In addition, a recent Protenus study (bit.ly/2jUv7gI) found that it took one healthcare organization over four years to discover a data breach. With digital […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.