IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
In-depth

What is IBM Z?

Say hello to the future of the secure IBM mainframe

Encryption of the future could be ubiquitous, thanks to IBM Z. This thoroughly modern mainframe zips through the time-consuming process of encryption, offering end-to-end protection to all the data it holds, a previously difficult feat. We spoke to Michael Jordan, distinguished engineer for IBM Z Security, to find out more.

How does IBM Z differ from existing encryption?

"Looking specifically at encryption of at-rest data, a key difference is how and where the encryption is integrated into the system. Encryption for at-rest data can occur at many levels of a system, including application, database, operating system and the physical media itself. We are providing encryption that is integrated into the operating system, which allows data to be encrypted at a very coarse scale with minimal overhead."

Who is this for?

"This isn't specifically designed for any particular use case, and based on discussions with many clients, it's expected to have broad appeal. The two main drivers from a client perspective are compliance and threat of a data breach. This cuts across all industries and geographies, [such as] encryption for application data, encryption for database data, encryption for batch workload data, transaction log data, encryption of unstructured data objects, such as images, scans, and PDFs."

Will we ever encrypt all our data?

"We would expect clients to start with encrypting the data for their most sensitive workloads first and expand as they gain experience. We anticipate that as clients select workloads to encrypt, they will encrypt all data for an application or database instead of identifying and classifying the sensitive data within the application or database. One important focus area for clients as they expand the scope of encryption is key management. Having a good enterprise key management system with robust backup and recovery is essential to ensuring business continuity in the event a key becomes unusable."

This article originally appeared in PC Pro. Main image credit: IBM

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Recommended

IT Pro News In Review: UK 4 day week, ransomware payment rise, IBM cut ties with Russia
Business operations

IT Pro News In Review: UK 4 day week, ransomware payment rise, IBM cut ties with Russia

10 Jun 2022
IBM bolsters cyber security offerings with Randori acquisition
mergers and acquisitions

IBM bolsters cyber security offerings with Randori acquisition

7 Jun 2022
IBM's new z16 mainframe brings two industry-firsts and quantum-proof data encryption
Hardware

IBM's new z16 mainframe brings two industry-firsts and quantum-proof data encryption

5 Apr 2022
Software-defined storage for dummies
Whitepaper

Software-defined storage for dummies

1 Apr 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022
Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022