Articles
How does z/OS data set encryption differentiate itself from other types of encryption for data at rest?
Cecilia Carranza Lewis
July 3, 2017
As clients begin their journey with pervasive encryption, they consider how best to protect their data in order to satisfy regulatory compliances and avoid potential data breaches. They often wonder how data set encryption differentiates itself from other types of encryption for data at rest, specifically hardware-level encryption. Understanding the value of each type of […]