June 28, 2021 By Didier André 2 min read

News headlines regularly feature the latest data breach and ransomware attack. It’s happening all over the world, nearly every day.

I first wrote about this risk in 2018. Sadly, despite efforts to combat cyberattacks, the threat is still all too real. Even in my hometown of Poughkeepsie, NY, a healthcare provider was hacked recently.

According to some analysts, hackers are not just looking for tons of raw data. Today, they’re especially focused on very valuable records such as user passwords, card and account numbers and social security numbers. As a result, today’s breaches can have especially far-reaching consequences.

The COVID-19 pandemic has created additional security risks with so many employees working remotely. In this climate, pervasive encryption is critical. It enables a customer to protect data even in the event of a breach. As I explained in my previous blog entry, pervasive encryption helps our clients to make the protection of data as easy and affordable as possible. It provides compliance quickly. And it works!

My team has helped many organizations improve their security posture by running IBM z/OS security health checks, to identify weak points in their security defense, or to implement pervasive encryption to better protect their client’s data.

One of our major clients from the payment industry implemented z/OS dataset encryption, the “star” feature of pervasive encryption, in a first phase with Db2 to maintain their compliance with PCI-DSS. And, as promised, the overhead was unnoticeable.

This is hardly the only success story. From the insurance industry to the healthcare industry, I’ve supported other implementations with high client satisfaction feedback. From a mainframe perspective, and from an IBM Lab Services point of view, I can say that I am relieved I haven’t been back to a hacked client crime scene lately.

We continue to improve pervasive, delivering enhancements such as the capability to encrypt non-extended format datasets and new functionalities like JES2 spool encryption (and compression). We also made key management easy with EKMF Web Edition. It is a graphical user interface running on Z to manage pervasive encryption keys easily and securely.

As you can read from my previous article, even for the mainframe, the most securable platform, a small mistake can put an entire business at risk.

But Lab Services is always ready to help. A pervasive encryption readiness assessment (PERA) can be a game changer. It is a one-day, on-site, in-person workshop (or two remote sessions while COVID restrictions persist), which provides in-depth education about pervasive encryption, readiness state assessment and an implementation roadmap. It is even easier for z15 clients to get help with the zForward program available at no additional charge.

Later on, Lab Services is also here to help you in your implementation journey, from what I call the fundamental bricks (such as ICSF and TKE), to the actual pervasive encryption implementation.

While cybercriminals become more and more sophisticated, our goal is to always be there, one step ahead. The threat may remain real, but the battle is far from over. So, if you are ready to fight, contact IBM Technology Lab Services now. We can help.

Was this article helpful?
YesNo

More from Cloud

Bigger isn’t always better: How hybrid AI pattern enables smaller language models

5 min read - As large language models (LLMs) have entered the common vernacular, people have discovered how to use apps that access them. Modern AI tools can generate, create, summarize, translate, classify and even converse. Tools in the generative AI domain allow us to generate responses to prompts after learning from existing artifacts. One area that has not seen much innovation is at the far edge and on constrained devices. We see some versions of AI apps running locally on mobile devices with…

IBM Tech Now: April 8, 2024

< 1 min read - ​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 96 On this episode, we're covering the following topics: IBM Cloud Logs A collaboration with IBM watsonx.ai and Anaconda IBM offerings in the G2 Spring Reports Stay plugged in You can check out the…

The advantages and disadvantages of private cloud 

6 min read - The popularity of private cloud is growing, primarily driven by the need for greater data security. Across industries like education, retail and government, organizations are choosing private cloud settings to conduct business use cases involving workloads with sensitive information and to comply with data privacy and compliance needs. In a report from Technavio (link resides outside ibm.com), the private cloud services market size is estimated to grow at a CAGR of 26.71% between 2023 and 2028, and it is forecast to increase by…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters