What is IBM Z?

Say hello to the future of the secure IBM mainframe

Encryption of the future could be ubiquitous, thanks to IBM Z. This thoroughly modern mainframe zips through the time-consuming process of encryption, offering end-to-end protection to all the data it holds, a previously difficult feat. We spoke to Michael Jordan, distinguished engineer for IBM Z Security, to find out more.

Advertisement - Article continues below

How does IBM Z differ from existing encryption?

"Looking specifically at encryption of at-rest data, a key difference is how and where the encryption is integrated into the system. Encryption for at-rest data can occur at many levels of a system, including application, database, operating system and the physical media itself. We are providing encryption that is integrated into the operating system, which allows data to be encrypted at a very coarse scale with minimal overhead."

Who is this for?

"This isn't specifically designed for any particular use case, and based on discussions with many clients, it's expected to have broad appeal. The two main drivers from a client perspective are compliance and threat of a data breach. This cuts across all industries and geographies, [such as] encryption for application data, encryption for database data, encryption for batch workload data, transaction log data, encryption of unstructured data objects, such as images, scans, and PDFs."

Advertisement - Article continues below
Advertisement - Article continues below

Will we ever encrypt all our data?

"We would expect clients to start with encrypting the data for their most sensitive workloads first and expand as they gain experience. We anticipate that as clients select workloads to encrypt, they will encrypt all data for an application or database instead of identifying and classifying the sensitive data within the application or database. One important focus area for clients as they expand the scope of encryption is key management. Having a good enterprise key management system with robust backup and recovery is essential to ensuring business continuity in the event a key becomes unusable."

This article originally appeared in PC Pro. Main image credit: IBM

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now


Amazon Web Services (AWS)

AWS launches Amazon Detective for investigating security incidents

1 Apr 2020

UK government to launch coronavirus 'contact tracking' app

1 Apr 2020
video conferencing

Zoom admits meetings don't use end-to-end encryption

1 Apr 2020
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020

Most Popular


Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020