End to End Encryption Options on z/OS
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Atlanta 2016 ,
2016
As enterprises pursue end-to-end encryption strategies, IT staff is faced with understanding a variety of security protocols and technologies that all seem to do similar things. This session describes and compares the end-to-end encryption options available on z/OS, and also provides some thoughts on selecting network encryption technologies for different z/OS workloads.-Chris Meyer-IBM Corporation
Back to Proceedings File Library