Skip to main content

Sort by
Articles

Streamline Regulatory Compliance With a Hybrid Cloud

Kristin Lewotsky

April 1, 2019

In today’s business climate, just delivering goods and services to customers is no longer enough. Amid an ongoing stream of security breaches, countries, regions and industries around the globe have established regulations governing data protection—data privacy and data security. As a result, enterprises need to demonstrate and maintain compliance around egulations such as the European […]

Articles

Secure Service Containers and Consumption-Based Pricing Enable Opportunity

Shirley S. Savage

November 1, 2018

Organizations are eager to capture opportunities that beckon in the marketplace. They know that new and modernized applications are necessary to better serve customers. Organizations also realize that, now more than ever, security remains crucial to business success. In October, IBM announced IBM Secure Service Containers, a new offering that provides benefits for security, as […]

Articles

IBM z14 Model ZR1 Is Ready for Cloud, Pervasive Encryption and More

Jim Utsler

May 1, 2018

How can medium-sized businesses solve the conundrum of scaling for business growth with ease and confidence? The answer is the latest lean, mean and super fast player in the IBM Z* product line, the IBM z14* Model ZR1. It hits the field of play with a complete new physical system design. In a world where […]

Articles

Linux on IBM Z Positions Clients to Move Forward

Jeff Reser

May 1, 2018

Through the lens of a new wave of technological advances built around advanced analytics, artificial intelligence (AI), machine learning, container development, blockchain, cloud and data security, a strategy shift is occurring in how mainframes are being used and leveraged. At the same time, mainframes are being refreshed with features around Linux*, pervasive encryption, virtualization and performance—all integrated […]

Articles

Why Clients Rely on Linux on IBM Z and LinuxONE

Shirley S. Savage

May 1, 2018

Today’s demanding workloads require a flexible approach for DevOps and deployment. IBM Z* clients reap the benefits of flexibility by running Linux* along with traditional IBM Z OSes. Organizations also are deploying Linux in standalone IBM Z and LinuxONE* installations. The Linux OS enables clients to use up-to-date technologies for their applications. Linux workloads integrated […]

Articles

ICSF HCR77C1, the z14 and Pervasive Encryption

Greg Boyd

April 1, 2018

ICSF is a component of z/OS and IBM is touting HCR77C1 and the z14 to deliver pervasive encryption.

Articles

New and Established IBM Offerings Meet Enterprise Data Protection Needs

Gene Rebeck

March 1, 2018

With all of the massive, high-profile data breaches that large enterprises have experienced over the past several years, businesses of all sizes have responded by erecting heavy digital fortifications around their data. Or maybe they haven’t. “What’s kind of alarming is that while a lot of clients understand the risk with the need to protect […]

Articles

IBM z14 Pervasive Encryption Protects All Data

Brett Martin

January 2, 2018

In reality, encryption is largely absent from corporate data centers. The IBM z14 is poised to change that.

Articles

IBM Z Pervasive Encryption Marks a Paradigm Shift for Security

Evelyn Hoover

July 17, 2017

Trust is the currency that drives the new economy. It’s the foundation of digital relationships and demands security, transparency and greater value in every interaction and transaction. That’s among the reasons IBM equipped the new z14 system with pervasive encryption. Transitioning away from selective encryption to end-to-end protection helps organizations secure all of their enterprise […]

Articles

How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?

Cecilia Carranza Lewis

July 3, 2017

As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]