It’s no mystery to IBMers why 97 of the top 100 worldwide banks leverage our mainframe technology to secure sensitive financial information: System z has the highest security rating/classification for any commercially-available server and is the only server to obtain the EAL5+ security classification.1
But for those who remain skeptical or question the value of a mainframe system environment, we continue to improve the security and reliability of System z and demonstrate why z is the ultimate security platform.
To add to our series of security posts we began last week, we have worked with colleagues from across IBM to find new and relevant perspectives on mainframe security issues and shared them below with short descriptions.
- System z continues to reign as the Ultimate Security Platform – Tom Turner explains many of the hardware and software security capabilities, new and not-so-new alike, that make System z a state-of-the-art platform for ultimate data security and reliability by design.
- Leveraging the mainframe for cloud computing and consolidated security management – Glinda Cummings demonstrates how System z mainframes help deliver a solid, extremely secure foundation on which to build a virtual environment.
- Enhancing your mainframe security intelligence – Gathering intelligence on security in real-time is fast becoming a top priority for businesses looking to keep their critical information safe and secure. Glinda Cumming’s post explores some ways IBM can help provide organizations with actionable insight into threats and risks in mainframe and distributed systems environments.
- Are You the Keymaster? Yes, Actually, I am – Paul DiMarzio describes how you can leverage a mainframe environment to help address enterprise key management needs, especially those related to key protection and key management.
- Taking the Rocket Science out of Data Encryption – Anne Lescher shows how to simplify the complex encryption technology that protects your most sensitive data without compromising its integrity, usability, security, interoperability, recoverability, and performance.
Editor’s Note: This blog post is part of a series on IT security we are running in December 2012 to help readers understand key aspects of security, including reputational risk, cloud security, and the role of hardware, software and services in security solutions.
We encourage you to read the other posts in our series, listed below:
- Reputational Risk and IT: They’re Closer Than You Think by Yesica Schaaf
- Security-Ready IT: A Fundamental Imperative for Smarter Computing by Shelley Westman
- How IBM Saves Money by Eating Our Own Dinner by Jonathan Barney
- Enterprise Systems and Security by Amy Bennett
 Based on ‘The Banker,’ System z install base and financial records.
To effectively compete in today’s changing world, it is essential that companies leverage innovative technology to differentiate from competitors. Learn how you can do that and more in the Smarter Computing Analyst Paper from Hurwitz and Associates.