End to End Encryption Options on z/OS
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2017 ,
SHARE San Jose 2017
As enterprises pursue end-to-end encryption strategies, IT staff is faced with understanding a variety of security protocols and technologies that all seem to do similar things. In this session our speaker will describe and compare the end-to-end encryption options available on z/OS. He will also provide some thoughts on selecting network encryption technologies for different z/OS workloads.-Chris Meyer-IBM Corporation
Back to Proceedings File Library