Abstract:
Organizations are under tremendous pressure to protect the data in their enterprises. Strong walls and perimeter defenses are no longer viewed as adequate, and most organ...Show MoreMetadata
Abstract:
Organizations are under tremendous pressure to protect the data in their enterprises. Strong walls and perimeter defenses are no longer viewed as adequate, and most organizations agree that encryption plays a vital role in protecting critical information. However, the practice of implementing an encryption strategy can vary greatly as organizations struggle with practical challenges of deploying encryption solutions. In this paper, we explain how innovations in the IBM Z stack, spanning hardware, firmware, operating systems, and middleware combine to help organizations address the challenges of protecting the data at the center of their enterprises using pervasive encryption, which can be enabled by policy and be transparent to applications.
Published in: IBM Journal of Research and Development ( Volume: 62, Issue: 2/3, 01 March-May 2018)