IBM Systems Magazine, Mainframe - January/February 2018 - 26

further lock down systems so
users are not only encrypting their
data, but also controlling who
has access to it, including from
internal credential abuse and
external, pilfered credential use.
Although it might not be lack
of interest in encryption-but
rather the costs associated with
it-causing some organizations to
forego or limit its use, the GDPR

is encouraging a second look at
it. Just as fines, potential lawsuits
and damaged brands are reason
enough to deploy encryption, so
is the goodwill that comes with
it, as customers place increased
accountability in organizations that
are diligently protecting their data.
Rather than parsing EU data
members from non-EU data
members, it's easier to treat

all data in the same manner,
with the safeguards offered by
pervasive encryption being used
across the board.
Of the firms that fall under
GDPR, eight in 10 expect they'll
have to adapt their existing
products and service offerings
to comply with the regulation,
anticipating that they'll have to
spend upward of $5 million for

Take a Proactive Approach to Compliance
Over the past few years, increasing amounts of
data, from healthcare providers, law firms, banking
institutions and other often-regulated organizations
that provide critical services, have moved online.
This is largely due to the amount of efficiencies
computing offers, with, for example, hospitals being
able to share patient data at the push of a button.
It's also why regulations such as General Data
Protection Regulation, Gramm-Leach-Bliley Act,
HIPAA and PCI are enforced. Without their compliance requirements, some critical data might not be
protected-and could be stored in simple cleartext,
accessible to any entity that has gained network
access, including those that are unauthorized.
Fortunately for companies and those who
conduct business with them, these regulations
often make it clear which data has to be most
securely protected. Typically, this is done using
encryption. However, the mechanisms, details and
overall operation of encryption can often be difficult
to manage and challenge system performance.
To address this concern and ensure that data can
be fully protected more easily, IBM has pioneered the
science of encrypting data wherever the data is in
the system and letting the OS do the hard work.
IBM has developed chip-level encryption in the new
IBM z14* that can alleviate much of the challenge
and surrounding encryption by enabling organizations to simply encrypt everything everywhere.
"The term 'pervasive' is nice because it
provides the concept that everything is protected
end-to-end, wherever data travels or is stored,"
remarks Phyllis Schneck, managing director,
Promontory Financial Group (an IBM company),
and former U.S. government cybersecurity official.

26 // JANUARY/FEBRUARY 2018 ibmsystemsmag.com

"For example, you really don't want a system that
requires laborious processes to lock and unlock a
simple email. So, if data is encrypted from beginning to end, as the encryption ability of the z14
allows, you know the data is inherently unreadable
by anyone but authorized parties, which ensures
compliance to regulations that demand that your
data has to be protected."
Promontory can help companies not only understand the benefits of pervasive encryption, but also
more broadly keep them in a place where they have
full compliance and open communication with regulators. This allows companies to be proactive and
build consumer confidence in their brand.
Additionally, as Schneck notes, "We have the
very difficult conversations with executives before
a crisis to enable decisions to be made thoughtfully
and applied when needed in an instant. So, you have
to conduct a risk assessment, prioritize your assets
before buying yet another cyber toy and understand
why this is important to your company.
"In the end, you'll have an idea of what your
risk tolerance is and what's the worst thing that
could happen to your company should something
indeed occur. We prioritize that for you so your
investments, your people, your culture are aligned
with your overall security goals. And we strengthen
your resilience to be sure you have a thoughtful,
well-practiced response when-not if-a cyber event
targets you."
For further insight into Promontory's services,
including how it's using cognitive computing to make
security regulations easier to understand and money
laundering easier to find, visit promontory.com.
-J.U.


http://www.promontory.com http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - January/February 2018

Table of Contents
Editor's Desk: Encryption Importance
Partner POV: Protect Your Assets: An application view of data is important for a point-in-time recovery
Currents: A Human-Centric Approach: IBM Design Thinking leads to an elevated user experience
Feature: Battle-Tested Tools: USAA integrates applications and data across platforms using RESTful APIs
Cover Story: Enterprise Peace of Mind: IBM z14 pervasive encryption protects all data
Feature: Worldwide Preparation: How IBM Z addresses GDPR compliance with pervasive encryption
Special Report: Rising to the Challenge: Survey shows opportunities for Linux on POWER
TECH Showcase: A Plan in Place: Determine which of the 7 levels of business continuity is right for you
Administrator: Improved Protection: Pervasive encryption features include integrated cryto hardware, key management, encryption of data at rest and data in flight, and Secure Service Container support
StopRun: Enthusiastic Education: Instructor brings the mainframe to eager students
Reference Point - Global Events, Education, Resources for Power Systems
2018 Mainframe Solution Edition
IBM Systems Magazine, Mainframe - January/February 2018 - Intro
IBM Systems Magazine, Mainframe - January/February 2018 - Cover1
IBM Systems Magazine, Mainframe - January/February 2018 - Cover2
IBM Systems Magazine, Mainframe - January/February 2018 - 1
IBM Systems Magazine, Mainframe - January/February 2018 - Table of Contents
IBM Systems Magazine, Mainframe - January/February 2018 - 3
IBM Systems Magazine, Mainframe - January/February 2018 - 4
IBM Systems Magazine, Mainframe - January/February 2018 - 5
IBM Systems Magazine, Mainframe - January/February 2018 - Editor's Desk: Encryption Importance
IBM Systems Magazine, Mainframe - January/February 2018 - 7
IBM Systems Magazine, Mainframe - January/February 2018 - Partner POV: Protect Your Assets: An application view of data is important for a point-in-time recovery
IBM Systems Magazine, Mainframe - January/February 2018 - 9
IBM Systems Magazine, Mainframe - January/February 2018 - Currents: A Human-Centric Approach: IBM Design Thinking leads to an elevated user experience
IBM Systems Magazine, Mainframe - January/February 2018 - 11
IBM Systems Magazine, Mainframe - January/February 2018 - 12
IBM Systems Magazine, Mainframe - January/February 2018 - 13
IBM Systems Magazine, Mainframe - January/February 2018 - Feature: Battle-Tested Tools: USAA integrates applications and data across platforms using RESTful APIs
IBM Systems Magazine, Mainframe - January/February 2018 - 15
IBM Systems Magazine, Mainframe - January/February 2018 - 16
IBM Systems Magazine, Mainframe - January/February 2018 - 17
IBM Systems Magazine, Mainframe - January/February 2018 - Cover Story: Enterprise Peace of Mind: IBM z14 pervasive encryption protects all data
IBM Systems Magazine, Mainframe - January/February 2018 - 19
IBM Systems Magazine, Mainframe - January/February 2018 - 20
IBM Systems Magazine, Mainframe - January/February 2018 - 21
IBM Systems Magazine, Mainframe - January/February 2018 - Feature: Worldwide Preparation: How IBM Z addresses GDPR compliance with pervasive encryption
IBM Systems Magazine, Mainframe - January/February 2018 - 23
IBM Systems Magazine, Mainframe - January/February 2018 - 24
IBM Systems Magazine, Mainframe - January/February 2018 - Special Report: Rising to the Challenge: Survey shows opportunities for Linux on POWER
IBM Systems Magazine, Mainframe - January/February 2018 - 26
IBM Systems Magazine, Mainframe - January/February 2018 - 27
IBM Systems Magazine, Mainframe - January/February 2018 - 28
IBM Systems Magazine, Mainframe - January/February 2018 - 29
IBM Systems Magazine, Mainframe - January/February 2018 - 30
IBM Systems Magazine, Mainframe - January/February 2018 - TECH Showcase: A Plan in Place: Determine which of the 7 levels of business continuity is right for you
IBM Systems Magazine, Mainframe - January/February 2018 - 32
IBM Systems Magazine, Mainframe - January/February 2018 - 33
IBM Systems Magazine, Mainframe - January/February 2018 - 34
IBM Systems Magazine, Mainframe - January/February 2018 - Administrator: Improved Protection: Pervasive encryption features include integrated cryto hardware, key management, encryption of data at rest and data in flight, and Secure Service Container support
IBM Systems Magazine, Mainframe - January/February 2018 - 36
IBM Systems Magazine, Mainframe - January/February 2018 - 37
IBM Systems Magazine, Mainframe - January/February 2018 - 38
IBM Systems Magazine, Mainframe - January/February 2018 - 39
IBM Systems Magazine, Mainframe - January/February 2018 - StopRun: Enthusiastic Education: Instructor brings the mainframe to eager students
IBM Systems Magazine, Mainframe - January/February 2018 - Cover3
IBM Systems Magazine, Mainframe - January/February 2018 - Cover4
IBM Systems Magazine, Mainframe - January/February 2018 - Reference Point - Global Events, Education, Resources for Power Systems
IBM Systems Magazine, Mainframe - January/February 2018 - SE
IBM Systems Magazine, Mainframe - January/February 2018 - 2018 Mainframe Solution Edition
IBM Systems Magazine, Mainframe - January/February 2018 - SECover2
IBM Systems Magazine, Mainframe - January/February 2018 - SE3
IBM Systems Magazine, Mainframe - January/February 2018 - SE4
IBM Systems Magazine, Mainframe - January/February 2018 - SE5
IBM Systems Magazine, Mainframe - January/February 2018 - SE6
IBM Systems Magazine, Mainframe - January/February 2018 - SE7
IBM Systems Magazine, Mainframe - January/February 2018 - SE8
IBM Systems Magazine, Mainframe - January/February 2018 - CT1
IBM Systems Magazine, Mainframe - January/February 2018 - CT2
IBM Systems Magazine, Mainframe - January/February 2018 - SE9
IBM Systems Magazine, Mainframe - January/February 2018 - SE10
IBM Systems Magazine, Mainframe - January/February 2018 - SE11
IBM Systems Magazine, Mainframe - January/February 2018 - SE12
IBM Systems Magazine, Mainframe - January/February 2018 - SE13
IBM Systems Magazine, Mainframe - January/February 2018 - SE14
IBM Systems Magazine, Mainframe - January/February 2018 - SE15
IBM Systems Magazine, Mainframe - January/February 2018 - SE16
IBM Systems Magazine, Mainframe - January/February 2018 - SE17
IBM Systems Magazine, Mainframe - January/February 2018 - SE18
IBM Systems Magazine, Mainframe - January/February 2018 - SE19
IBM Systems Magazine, Mainframe - January/February 2018 - SE20
IBM Systems Magazine, Mainframe - January/February 2018 - SE21
IBM Systems Magazine, Mainframe - January/February 2018 - SE22
IBM Systems Magazine, Mainframe - January/February 2018 - SE23
IBM Systems Magazine, Mainframe - January/February 2018 - SE24
IBM Systems Magazine, Mainframe - January/February 2018 - SE25
IBM Systems Magazine, Mainframe - January/February 2018 - SE26
IBM Systems Magazine, Mainframe - January/February 2018 - SE27
IBM Systems Magazine, Mainframe - January/February 2018 - SE28
IBM Systems Magazine, Mainframe - January/February 2018 - SE29
IBM Systems Magazine, Mainframe - January/February 2018 - SE30
IBM Systems Magazine, Mainframe - January/February 2018 - SE31
IBM Systems Magazine, Mainframe - January/February 2018 - SE32
IBM Systems Magazine, Mainframe - January/February 2018 - SE33
IBM Systems Magazine, Mainframe - January/February 2018 - SE34
IBM Systems Magazine, Mainframe - January/February 2018 - SE35
IBM Systems Magazine, Mainframe - January/February 2018 - SE36
IBM Systems Magazine, Mainframe - January/February 2018 - SE37
IBM Systems Magazine, Mainframe - January/February 2018 - SE38
IBM Systems Magazine, Mainframe - January/February 2018 - SE39
IBM Systems Magazine, Mainframe - January/February 2018 - SE40
IBM Systems Magazine, Mainframe - January/February 2018 - SE41
IBM Systems Magazine, Mainframe - January/February 2018 - SE42
IBM Systems Magazine, Mainframe - January/February 2018 - SE43
IBM Systems Magazine, Mainframe - January/February 2018 - SE44
IBM Systems Magazine, Mainframe - January/February 2018 - SE45
IBM Systems Magazine, Mainframe - January/February 2018 - SE46
IBM Systems Magazine, Mainframe - January/February 2018 - SECover3
IBM Systems Magazine, Mainframe - January/February 2018 - SECover4
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com