Live: Protection Begins with Data at the Center: Encrypt it All with z Systems Pervasive Encryption
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Providence 2017 ,
2017
The world is built upon an intrinsic trust that we, as clients and consumers, have in the businesses we deal with; trust that our banks will always maintain accurate balances and transaction data on our accounts; trust that our insurance company will be able to find their policy records when needed; trust that the airline will have our check-in information months after the reservation was made. Can you imagine what it would be like without this trust?
Though the financial impact of a data breach is daunting at an average of $4M per event, cyber attacks threaten to undermine this fundamental principle. Strong walls and perimeter defenses are no longer adequate to shield organizations from attack, and with industries and governments trying to ensure this trust is maintained, regulations are becoming more complex, costly, and time consuming.
In this session we will explore the critical role of pervasive encryption within the digital enterprise, and learn how pervasive encryption on IBM z Systems can help protect an organization’s data, without the need for costly application changes.-Michael Jordan-IBM
Back to Proceedings File Library