IBM's Z mainframe can encrypt all your data and applications

New encryption system covers all data by default to thwart hackers

IBM has launched a new mainframe system that it claims will revolutionise how data, networks, devices and applications are encrypted.

IBM Z is the latest in Big Blue's mainframe series and a significant step up from x86 systems, which typically encrypt data in chunks - a process that IBM said requires a significant labour investment to select and manage individual fields.

By contrast, Z can encrypt data, networks, external devices and entire applications with no changes to those applications.

The company said it has been able to achieve this through a 7x increase in cryptographic performance versus the previous generation z13 mainframe, driven by a fourfold increase in the amount of silicon dedicated to encryption algorithms. It's also 18 times faster than what x86-based systems can achieve, IBM claimed.

Advertisement
Advertisement - Article continues below

Additionally, this new generation of IBM Z offers "tamper responding" hardware that invalidates the encryption keys if an intrusion is detected. While this may sound drastic, the keys can still be recovered by administrators once the intrusion has been investigated and resolved. The capability can also be extended into other devices like storage systems and cloud servers.

Ross Mauri, general manager of IBM Z, said: "The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale.

"We created a data protection engine for the cloud era to have a significant and immediate impact on global data security."

Indeed, the company has taken some of the technology from its new generation Z mainframe and applied it to IBM Cloud. It will initially be used as an encryption engine for its cloud and to run IBM Blockchain services.

"The powerful combination of IBM Z encryption and secure containers differentiates IBM Blockchain services on the cloud by supporting the trust models new blockchain networks require," said Marie Wieck, general manager of IBM Blockchain. "Enterprise clients also benefit from the ease of use making management transparent to the application and the user."

Picture: IBM

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019