IBM Systems Magazine, Mainframe - March/April 2018 - 27
New and established IBM offerings to meet
enterprise data protection needs
By Gene Rebeck k Illustration by Kai and Sunny
ith all of the massive,
high-profile data breaches
that large enterprises
have experienced over the past
several years, businesses of all
sizes have responded by erecting
heavy digital fortifications
around their data.
Or maybe they haven't.
"What's kind of alarming is that
while a lot of clients understand
the risk with the need to protect
data, only about 4 percent of the
enterprises out there are actually
encrypting their data," notes Diana
Henderson, offering manager for
IBM Z* and LinuxONE*, with a
specialization in security.
It's not that they don't want
to do so, she adds. Enterprises
are well aware that they need
to guard their data, particularly
since much of it originates
from clients and vendors.
Thieves are innumerable, they
operate worldwide and their
weapons continually grow more
powerful. Simultaneously, many
industries face new national
and international cybersecurity
regulations driving further need
to guard the data.
The problem is that security
is very hard work. "What many
of our clients have told us is that
it takes a significant amount of
effort to manage techniques like
encryption," Henderson says.
As more enterprises move their
data to private and public clouds,
they realize that cloud computing
can help them more effectively
and efficiently manage their
data, workloads, applications
and the systems that contain
them. But how can organizations
make sure those clouds are
secure? As cybersecurity
requirements become more
demanding, the IBM Z platform
has introduced and updated a
number of features that make
securing the cloud less daunting.
banks, for instance-and thus
provide a kind of back door into
those larger firms' treasure troves.
What's more, many of the tools
that cybercrooks use to gain access
into an organization, such as
ransomware and phishing emails,
are used in tandem. "Phishing,
for instance, could be used to gain
access," Henderson says. "Then
coupled with malware, they try to
capture and export data or take
control of the system."
If sensitive customer and
vendor data falls into these
thieves' hands, that can result
in extortion for financial gain.
Falling victim to identity theft can
There's no doubt about it:
Enterprise organizations are under
attack, Henderson says. And those
attacks, she notes, are getting more
intense-the number of attacks,
how they originate, their reach and
who orchestrates them.
And let there be no doubt that
cybersecurity is essential to any
enterprise. Even smaller ones
that think they're not on hackers'
radars can find themselves under
attack. Small organizations, after
all, often work with larger ones-
While many clients and organizations
understand the risk of not having data
protection in place, security can be difficult. No
matter the cloud type, security is important.
As cybersecurity requirements become more
demanding, the IBM Z platform has introduced
and updated several features that make
securing the cloud a much less daunting task.
Among the tools, IBM has recently introduced
pervasive encryption, multifactor authentication
and Secure Service Containers.
ibmsystemsmag.com MARCH/APRIL 2018 // 27