What's New in z Systems Crypto: Enterprise Key Management Edition
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings,
SHARE Providence 2017,
2017
Encryption is based on solid algorithms and cryptographic keys. Cryptographic  algorithms are public, so the security of sensitive data is dependent on the security of the cryptographic keys. Join us in this session for a discussion on the different key management activities and a few tools and tricks to make key management easier.-Eysha Shirrine Powers-IBM
Back to Proceedings File Library