IBM Z | Secure your data with total encryption

IBM Z | Secure your data with total encryption


– You shouldn’t have to
choose what data to encrypt or worry about complying with
ever-changing regulations. Pervasive Encryption on IBM z14 let’s you encrypt all your
data without interruption. Keeping your data safer and giving you much more peace of mind. (light guitar music) – Many of our clients,
they don’t want to be the next big name
headlined in the newspaper. They’re worried about reputational risk. They’re worried about loss of customer, loss of customer trust, and that impacts their bottom line. – People realize that
encryption is important, but, there’s also kind of this association of crypto with being complicated, being complex, being
difficult, being hard. (light guitar music) – What we’ve aimed to do here is really make encryption so simple that it’s a no-brainer
for them to turn on, and it’s very easy to do, and
consumable and transparent. – The z14 machine is essentially
an encryption monster. The security is designed and architected into every layer of this
stack from the hardware, to the firmware, to the hypervisor, to the operating system, to
the software and middleware. From the top to bottom. We want to be able to encrypt and protect every byte of data that’s either coming to or leaving the box. That’s the fundamental concept without making any application changes
and for a minimal cost. When we looked at
delivering this capability that we’re calling Pervasive Encryption, we understood that to enable
extensive use of encryption we needed a hardware encryption engine on the platform that was
capable of delivering extensive encryption at a very low cost. – And the z14 takes that security
storage to the next level. We have, on each processor, a dedicated cryptographic co-processor that accelerates in hardware the encryption and decryption of data. – We’re allowing you to
migrate your data and databases from being unencrypted to encrypted without disruption and without
you know, business impact. – Now we’re saying, “Go
ahead and encrypt your data “at scale, very, very
broadly across the enterprise “at the scale and level of cost “that you can afford to go and implement.” (light guitar music)

Leave a Reply

Your email address will not be published. Required fields are marked *