IBM Systems Magazine, Mainframe - January/February 2018 - 27
product adaptation and other
related expenses3. For some, that
money might be better spent on a
z14 and its pervasive encryption
technology, which removes the
guesswork from deciding what to
encrypt and where to encrypt it,
including in the cloud.
Encryption as a Utility
Although companies must
address other factors when it
comes to GDPR, as evidenced
by the IBM Security GDPR
particularly z14 pervasive
encryption-is perhaps one of
the most fundamental aspects to
consider. And this applies to not
only meeting immediate GDPR
and compliance expectations, but
also those that may come up in
"Anything you design should
take encryption into account. It's
like when I want a drink of water.
I just go over to the faucet and I
turn it on. It's a utility," Compert
says. "I think encryption should
be looked at in the same way. It's
just there. It's transparent. Why
wouldn't you want to implement
it as a general, every-bit-of-data
default? In fact, we need to
change the discussion from why
you should use encryption to why
wouldn't you use encryption."
Jim Utsler, senior writer for
IBM Systems Magazine, has
been covering technology for
more than 20 years.
1. GDPR Article 34.3(a) ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf
2. Solitaire Interglobal Ltd. "Pervasive Encryption, A New Paradigm for Protection" ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=ZSL03452USEN&
3. The International Association of Privacy Professionals (IAPP) "IAPP-EY Annual Privacy Governance Report 2017"
Sacramento Convention Center
Take part in SHARE® Sacramento and experience a user-focused approach to education with
interactive training on topics such as IBM Z®, pervasive encryption, and new security technologies.
Additionally, you can gain insight from each other's careers and experiences.
Register by January 26, 2018, to save $200 on your registration.
Learn more at event.share.org/IBMSystemsAd.
ibmsystemsmag.com JANUARY/FEBRUARY 2018 // 27