Ultimate Security



 
 

It’s no mystery to IBMers why 97 of the top 100 worldwide banks leverage our mainframe technology to secure sensitive financial information: System z has the highest security rating/classification for any commercially-available server and is the only server to obtain the EAL5+ security classification.1

But for those who remain skeptical or question the value of a mainframe system environment, we continue to improve the security and reliability of System z and demonstrate why z is the ultimate security platform.

To add to our series of security posts we began last week, we have worked with colleagues from across IBM to find new and relevant perspectives on mainframe security issues and shared them below with short descriptions.

Editor’s Note: This blog post is part of a series on IT security we are running in December 2012 to help readers understand key aspects of security, including reputational risk, cloud security, and the role of hardware, software and services in security solutions.

We encourage you to read the other posts in our series, listed below:


[1] Based on ‘The Banker,’ System z install base and financial records.

 
 
Category: Product #: Regular price:$ (Sale ends ) Available from: Condition: Good ! Order now!
Reviewed by on. Rating:

Smarter Computing Analyst Paper - HurwitzTo effectively compete in today’s changing world, it is essential that companies leverage innovative technology to differentiate from competitors. Learn how you can do that and more in the Smarter Computing Analyst Paper from Hurwitz and Associates.

Subscribe to the Smarter Computing Blog
This entry was posted in Data Security, System z and tagged , , , , , . Bookmark the permalink.

Recent Posts

The culture of Always On embedded in your DNA

Siobhan Nicholson

We previously discussed the relevance of “cloud ready” and “data ready” to Always On. How is “security ready” relevant? Does being Always On bring new challenges because you are always vulnerable to some kind of security threat?

Continue reading

Three incorrect cloud consumer security expectations

Turgut Aslan

Talking to industrial client executives about their security expectations for cloud services can be enlightening. There are three areas where the assumptions and expectations are often wrong. Let’s have a look at each of these false expectations and set the record straight.

Continue reading

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>