Pervasive Encryption and IMS
Project and Program:
Application Development,
IMS
Tags:
Proceedings ,
SHARE Kansas City 2024
Using Pervasive Encryption with IMS database datasets requires some planning.
IMS is unique in many ways and keeping the IMS Infrastructure safe is as
important as keeping its databases safe. This session discusses IMS data,
datasets, logging and utility use from an encryption point of view: Why is
encryption important? What can be encrypted? What can�t be encrypted? Why should
it be encrypted? A brief rundown on implementation steps: who does what? Who is
affected? A brief rundown on observed anomalies and errors encountered.
Back to Proceedings File Library