2018 Mainframe Solutions Edition - SE27

ARTICLE: SECURITY

Pervasive Encryption
Keeps All Data Secure
D

ata breaches are a major concern for organizations. While
big breaches get lots of play in the news, smaller breaches
are just as devastating. Keeping data safe on the mainframe is
top of mind for IBM.
IBM Systems Magazine's recent readership survey found that
54 percent of respondents are deploying security solutions
currently, and another 8 percent expect to do so within the next
year. Because security is an overriding concern, respondents said
they wanted to better understand how to boost their mainframe
security. (See "Magazine Reader Survey Reveals Top Concerns
Among Mainframe Users," bit.ly/2z60HPq.)
Many respondents remarked that upper management doesn't
completely understand the value the mainframe brings to
keeping data secure. To provide guidance, Nick Sardino,
program director, IBM Z* Offering Management, has this
advice: "Security is architected into the entire platform from
the microprocessor and firmware, the hypervisors and OSes,
and all the way into the applications and middleware." He
also points out that the IBM Z platform provides security at 81
percent lower cost and is 8x more resistant to security threats
than competitors.
Pervasive Encryption

Another reason for using the mainframe is pervasive encryption.
Available on the new z14* system, pervasive encryption ensures
that all-not some-data is encrypted on the system. It also
reduces the complexity and cost of meeting compliance
mandates. (See "Pervasive Encryption is the No-Compromise
Approach to Data Protection on IBM z14," bit.ly/2x68QWw.)
"Strong walls and perimeter defenses are no longer
adequate to shield organizations from
cyberattacks," Sardino says. "We must
view data as the new perimeter and put
BY SHIRLEY

the security controls for the data on the data itself. That means
implementing strong encryption of data wherever it resides."
Many organizations consider encryption to be complex.
Some have opted for encrypting only the data needed to
meet compliance regulations. Such encryption happens at the
application level and can be costly because of the need for IT
personnel with encryption skills and ongoing maintenance.
Pervasive encryption is IBM's solution to this quandary. IBM
added several new capabilities integrated throughout the z14
stack in hardware, OS and middleware. IBM enhanced on-chip
cryptographic acceleration to provide 6x more performance
than the z13*, more than 18x faster than competing platforms,
according to a report by Solitaire Interglobal.
Further, IBM placed the bulk file and data set encryption at
a point in the OS to optimize performance and where it would
be transparent to applications. New capabilities were added
to encrypt the data in the z/OS* Coupling Facility and to report
on z/OS network session security.
Db2* and IMS* middleware were enhanced, too. "Clients
can transition Db2 and IMS high availability databases from
unencrypted to encrypted without stopping the database
or the application, which is a huge value for the DBAs we've
spoken to," Sardino says.
Paradigm Shift

IBM Z pervasive encryption represents a paradigm shift in how
organizations can protect their data.
Because all of the data within an enterprise is encrypted,
pervasive encryption thwarts hackers looking for certain data
to steal. It can also separate identification and classification
from the encryption process, reducing
the possibility of misclassified or
unidentified data.
S. SAVAGE

ibmsystemsmag.com/buyersguide 2018 // 27


http://www.bit.ly/2z60HPq http://www.bit.ly/2x68QWw http://www.ibmsystemsmag.com/buyersguide

Table of Contents for the Digital Edition of 2018 Mainframe Solutions Edition

Editor's Letter
Application Development
Business Intelligence/Analytics
Communications and Connectivity
Database
Education
HA/DR Backup
Linux on z Systems
Performance
Security
Services/Consulting
Software Vertical Markets
Systems Management
Tools and Utilities
Web Development
Market Changes Increase Demand for Nimble Developers
Business Continuity Depends on Backup and Recovery Plans
IBM z14 Features Accelerate Performance
Pervasive Encryption Keeps all Data Secure
z/OS Tools Spot Systems Management Issues
CM First Group: Application Development
Compuware Corporation: Application Development
21st Century Software: HA/DR Backup
Key Resources Inc.: Security
Product Index
2018 Mainframe Solutions Edition - SECover1
2018 Mainframe Solutions Edition - SECover2
2018 Mainframe Solutions Edition - SE3
2018 Mainframe Solutions Edition - SE4
2018 Mainframe Solutions Edition - Editor's Letter
2018 Mainframe Solutions Edition - SE6
2018 Mainframe Solutions Edition - SE7
2018 Mainframe Solutions Edition - SE8
2018 Mainframe Solutions Edition - CT1
2018 Mainframe Solutions Edition - CT2
2018 Mainframe Solutions Edition - SE9
2018 Mainframe Solutions Edition - Market Changes Increase Demand for Nimble Developers
2018 Mainframe Solutions Edition - CM First Group: Application Development
2018 Mainframe Solutions Edition - Application Development
2018 Mainframe Solutions Edition - Compuware Corporation: Application Development
2018 Mainframe Solutions Edition - SE14
2018 Mainframe Solutions Edition - SE15
2018 Mainframe Solutions Edition - Communications and Connectivity
2018 Mainframe Solutions Edition - Database
2018 Mainframe Solutions Edition - Education
2018 Mainframe Solutions Edition - Business Continuity Depends on Backup and Recovery Plans
2018 Mainframe Solutions Edition - 21st Century Software: HA/DR Backup
2018 Mainframe Solutions Edition - HA/DR Backup
2018 Mainframe Solutions Edition - SE22
2018 Mainframe Solutions Edition - Performance
2018 Mainframe Solutions Edition - IBM z14 Features Accelerate Performance
2018 Mainframe Solutions Edition - SE25
2018 Mainframe Solutions Edition - SE26
2018 Mainframe Solutions Edition - Pervasive Encryption Keeps all Data Secure
2018 Mainframe Solutions Edition - Key Resources Inc.: Security
2018 Mainframe Solutions Edition - Security
2018 Mainframe Solutions Edition - SE30
2018 Mainframe Solutions Edition - SE31
2018 Mainframe Solutions Edition - SE32
2018 Mainframe Solutions Edition - SE33
2018 Mainframe Solutions Edition - SE34
2018 Mainframe Solutions Edition - SE35
2018 Mainframe Solutions Edition - Software Vertical Markets
2018 Mainframe Solutions Edition - z/OS Tools Spot Systems Management Issues
2018 Mainframe Solutions Edition - Systems Management
2018 Mainframe Solutions Edition - SE39
2018 Mainframe Solutions Edition - SE40
2018 Mainframe Solutions Edition - SE41
2018 Mainframe Solutions Edition - Tools and Utilities
2018 Mainframe Solutions Edition - Web Development
2018 Mainframe Solutions Edition - Product Index
2018 Mainframe Solutions Edition - SE45
2018 Mainframe Solutions Edition - SE46
2018 Mainframe Solutions Edition - SECover3
2018 Mainframe Solutions Edition - SECover4
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com