Newsletters




IBM Boosts Security, Scalability and Storage with Latest Mainframe


IBM unveiled IBM Z, the next generation of the world’s most powerful transaction system, capable of running more than 12 billion encrypted transactions per day. The new system also introduces a breakthrough encryption engine that, for the first time, makes it possible to pervasively encrypt data associated with any application, cloud service or database all the time.

IBM Z’s new data encryption capabilities are designed to address the global epidemic of data breaches, a major factor in the $8 trillion cybercrime impact on the global economy by 2022. Of the more than nine billion data records lost or stolen since 2013, only 4% were encrypted, making the vast majority of such data vulnerable to organized cybercrime rings, state actors and employees misusing access to sensitive information.

In the most significant re-positioning of mainframe technology in more than a decade, when the platform embraced Linux and open source software, IBM Z now dramatically expands the protective cryptographic umbrella of the world’s most advanced encryption technology and key protection. The system’s advanced cryptographic capability now extends across any data, networks, external devices or entire applications – such as the IBM Cloud Blockchain service – with no application changes and no impact on business service level agreements.

"The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale," said Ross Mauri, general manager of IBM Z. "We created a data protection engine for the cloud era to have a significant and immediate impact on global data security."

IBM Z pervasive encryption reflects a call to action on data protection articulated by chief information security officers and data security experts worldwide, and more than 150 IBM clients around the world who participated and provided feedback in IBM Z’s system design over three years.

As a result of this collaboration, IBM Z brings advances in cryptography technology, building on a proven encryption platform that safeguards the world’s banking, healthcare, government and retail systems. IBM Z pervasive encryption delivers breakthroughs including pervasive encryption of data – all the time. IBM Z makes it possible, for the first time, for organizations to pervasively encrypt data associated with an entire application, cloud service or database in flight or at rest with one click. The standard practice today is to encrypt small chunks of data at a time, and invest significant labor to select and manage individual fields.

The new system also includes tamper-responding encryption keys. A top concern for organizations is protection of encryption keys. In large organizations, hackers often target encryption keys, which are routinely exposed in memory as they are used. Only IBM Z can protect millions of keys (as well as the process of accessing, generating and recycling them) in “tamper responding” hardware that causes keys to be invalidated at any sign of intrusion and can then be restored in safety. The IBM Z key management system is designed to meet Federal Information Processing Standards (FIPS) Level 4 standards, where the norm for high security in the industry is Level 2. This IBM Z capability can be extended beyond the mainframe to other devices, such as storage systems and servers in the cloud. In addition, IBM Secure Service Container protects against insider threats from contractors and privileged users, provides automatic encryption of data and code in-flight and at-rest, and tamper-resistance during installation and runtime. 

IBM z/OS Connect technologies also are designed to make it easy for cloud developers to discover and call any IBM Z application or data from a cloud service, or for IBM Z developers to call any cloud service. IBM Z now allows organizations to encrypt these APIs – the digital glue that links services, applications and systems.

IBM also announced three new Container Pricing models for IBM Z, providing clients greatly simplified software pricing that combines flexible deployment with competitive economics vs. public clouds and on-premises x86 environments. New microservices and applications that enable clients to maximize the value from security-rich on-premises enterprise systems in real time. Clients can now co-locate applications to optimize qualities of services that are priced competitively with public cloud and on-premises platforms.

For more details, visit www-03.ibm.com/systems/z.


Sponsors