Tagged In:
Storage Power Systems Mainframes AI IBM Systems Lab Services
Related Tags
Newest by Date Newest by Title Oldest by Date Oldest by Title
The next “tick” of SUSE Linux Enterprise Server for IBM Z and LinuxONE
The working philosophy at Fort Vale is “continuous improvement” according to the UK-based ...
Security considerations for critical environments
In today’s digital world, data is the primary asset for most organizations. Access to data and changes of the data need to be restricted to authorized persons, devices or processes. IT devices need to be protected from the execution of non-...
Is your smartphone data safer than your enterprise data?
More than eighty percent of smartphone data is encrypted, according to an IBM-sponsored Solitaire Interglobal Ltd. report upon which this blog post is based.[i] You might expect a similarly high percentage of enterprise data to be encrypted as well, ...
Three ways to collaborate to improve cybersecurity
The stakes are high in enterprise security. Data breaches can damage your organization’s reputation and result in significant costs (USD 3.86 million for every breach on average according to this Ponemon Cost of a Data Breach study). They can also ...
Data protection in the new era of the data-driven economy
As I was following up on GDPR requirements and the implications, it got me thinking into what it means for traditional backup and data protection functions within IT organizations. Up until now, data protection has been an important but often IT-...
IBM Z and healthcare: when data protection is crucial to your business
IBM’s “Big Iron” mainframe immediately conjures up images: rock solid, dependable, security-...
Pervasive protection
Perhaps as many as 45,000 cyberattacks occur around the world each day.[1] It’s easy to understand why cybersecurity is the top IT spending priority for businesses large and small, and has been for years.[2] Data breaches are costly. In the United ...