IBM's Z mainframe can encrypt all your data and applications

New encryption system covers all data by default to thwart hackers

IBM has launched a new mainframe system that it claims will revolutionise how data, networks, devices and applications are encrypted.

IBM Z is the latest in Big Blue's mainframe series and a significant step up from x86 systems, which typically encrypt data in chunks - a process that IBM said requires a significant labour investment to select and manage individual fields.

By contrast, Z can encrypt data, networks, external devices and entire applications with no changes to those applications.

The company said it has been able to achieve this through a 7x increase in cryptographic performance versus the previous generation z13 mainframe, driven by a fourfold increase in the amount of silicon dedicated to encryption algorithms. It's also 18 times faster than what x86-based systems can achieve, IBM claimed.

Additionally, this new generation of IBM Z offers "tamper responding" hardware that invalidates the encryption keys if an intrusion is detected. While this may sound drastic, the keys can still be recovered by administrators once the intrusion has been investigated and resolved. The capability can also be extended into other devices like storage systems and cloud servers.

Ross Mauri, general manager of IBM Z, said: "The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale.

"We created a data protection engine for the cloud era to have a significant and immediate impact on global data security."

Indeed, the company has taken some of the technology from its new generation Z mainframe and applied it to IBM Cloud. It will initially be used as an encryption engine for its cloud and to run IBM Blockchain services.

"The powerful combination of IBM Z encryption and secure containers differentiates IBM Blockchain services on the cloud by supporting the trust models new blockchain networks require," said Marie Wieck, general manager of IBM Blockchain. "Enterprise clients also benefit from the ease of use making management transparent to the application and the user."

Picture: IBM

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
Best free malware removal tools 2021
Security

Best free malware removal tools 2021

5 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021