In-depth

What is IBM Z?

Say hello to the future of the secure IBM mainframe

Encryption of the future could be ubiquitous, thanks to IBM Z. This thoroughly modern mainframe zips through the time-consuming process of encryption, offering end-to-end protection to all the data it holds, a previously difficult feat. We spoke to Michael Jordan, distinguished engineer for IBM Z Security, to find out more.

How does IBM Z differ from existing encryption?

"Looking specifically at encryption of at-rest data, a key difference is how and where the encryption is integrated into the system. Encryption for at-rest data can occur at many levels of a system, including application, database, operating system and the physical media itself. We are providing encryption that is integrated into the operating system, which allows data to be encrypted at a very coarse scale with minimal overhead."

Who is this for?

"This isn't specifically designed for any particular use case, and based on discussions with many clients, it's expected to have broad appeal. The two main drivers from a client perspective are compliance and threat of a data breach. This cuts across all industries and geographies, [such as] encryption for application data, encryption for database data, encryption for batch workload data, transaction log data, encryption of unstructured data objects, such as images, scans, and PDFs."

Will we ever encrypt all our data?

"We would expect clients to start with encrypting the data for their most sensitive workloads first and expand as they gain experience. We anticipate that as clients select workloads to encrypt, they will encrypt all data for an application or database instead of identifying and classifying the sensitive data within the application or database. One important focus area for clients as they expand the scope of encryption is key management. Having a good enterprise key management system with robust backup and recovery is essential to ensuring business continuity in the event a key becomes unusable."

This article originally appeared in PC Pro. Main image credit: IBM

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

Cisco lands $1 billion defense IT contract
Security

Cisco lands $1 billion defense IT contract

15 Jun 2021
REvil hacking group attacks US nuclear weapons contractor
ransomware

REvil hacking group attacks US nuclear weapons contractor

15 Jun 2021
Putin open to handing cyber criminals over to US
hacking

Putin open to handing cyber criminals over to US

14 Jun 2021
Futurex‌ ‌and Google enable‌ ‌client-side‌ ‌Google‌ ‌Workspace encryption‌
Google Docs

Futurex‌ ‌and Google enable‌ ‌client-side‌ ‌Google‌ ‌Workspace encryption‌

14 Jun 2021

Most Popular

GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021
WWDC 2021: Apple unveils iOS 15, macOS Monterey and more
iOS

WWDC 2021: Apple unveils iOS 15, macOS Monterey and more

8 Jun 2021
OnePlus 9 Pro review: An instant cult classic
Hardware

OnePlus 9 Pro review: An instant cult classic

7 Jun 2021