Venafi Study: Consumers Conflicted About Encryption Backdoors – Business Wire (press release)

SALT LAKE CITY--(BUSINESS WIRE)--Venafi, the leading provider of machine identity protection, today announced the findings of a study that evaluated attitudes and opinions of 3,000 adult consumers from the United States, the United Kingdom and Germany on initiatives that would grant governments more access to private, encrypted data.

According to the study, half of consumers (51 percent) do not believe their government can protect their personal data, and nearly two-thirds of respondents (65 percent) suspect their government already abuses its powers to access the data of citizens. Additionally, 68 percent of respondents believe governments should not force private companies to hand over encrypted personal data without consumer consent.

The study also found that consumers are concerned about the impact encryption backdoors would have on their personal privacy. Sixty fire percent of respondents state that governments should not be able to force citizens to turn over personal data, such as the contents of mobile phones, social media, email and online activity, without consent.

The results of this research indicate that security and privacy are probably going to get a lot worse before they get better, said Jeff Hudson, CEO of Venafi. Its very clear that consumers are confused about what access to encrypted data will mean to their privacy, and its equally clear that governments dont understand how encryption backdoors will be used to undermine our global digital economy. The negative impact encryption backdoors will have on every aspect of security and privacy is tremendous.

Despite concerns regarding government abuse, many consumers remain conflicted over how encryption backdoors would impact both their privacy and national security:

Hudson continued: Giving governments access to encryption will not make us safer from terrorism in fact, the opposite is true. Most people dont trust the government to protect data and they dont believe the government is effective at fighting cybercrime. Its ironic that we believe we would be safer if governments were given more power to access private encrypted data because this will undermine the security of our entire digital economy.

Encryption backdoors create vulnerabilities that can be exploited by a wide range of malicious actors, including hostile or abusive government agencies. Billions of people worldwide rely on encryption to protect a wide range of critical infrastructure, including global financial systems, electrical grid and transportation systems, from cybercriminals who steal data for financial gain or espionage.

The study was conducted by One Poll and completed in July 2017. It analyzed responses from three thousand adult consumers from the United States, United Kingdom and Germany.

For more detailed information on the survey, please visit: https://www.venafi.com/blog/survey-results-consumers-skeptical-of-government-backdoors

About Venafi

Venafiis the cybersecurity market leader in machine identity protection, securing all connections and communications between machines. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise on premises, mobile, virtual, cloud and IoT at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

With over 30 patents, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations, including the top five U.S. health insurers, the top five U.S. airlines, four of the top five U.S., U.K. and South African banks, and four of the top five U.S. retailers. For more information, visit http://venafi.com.

See the rest here:
Venafi Study: Consumers Conflicted About Encryption Backdoors - Business Wire (press release)

General Dynamics Adds New NSA-certified TACLANE-FLEX Type 1 Network Encryption Platform to Secure Product … – PR Newswire (press release)

"We designed the TACLANE-FLEX to be scalable and customizable to meet the fluid demands of today's missions," said Mike Tweed-Kent, vice president and general manager of the Cyber and Electronic Warfare Systems line of business for General Dynamics Mission Systems. "TACLANE is the most widely deployed HAIPE encryptor in the world, and General Dynamics will continue to invest in and enhance this product family to ensure it addresses customers' requirements today and supports the unforeseen needs of tomorrow."

Built upon the market-leading TACLANE technology, the TACLANE-FLEX is the same form and fit of the TACLANE-Micro (KG-175D), allowing simple swap-out for customers in need of increased data rates and security features in a small form factor. The combination of its low size, weight and power (SWaP) and ruggedized design, provides users with the option to use the TACLANE-FLEX in tactical or strategic environments.

As bandwidth needs grow, and applications and environments change, TACLANE-FLEX offers a cost-effective approach that allows customers to tailor their security solution based on current needs and budget. The innovative design makes TACLANE-FLEX a delivery platform for future software-based capability upgrades, allowing it to scale to meet the dynamics needs customers will face in the years to come.

Customers are able to add functionality to TACLANE-FLEX through two optional software features, TACLANE Trusted Sensor Software and Agile Virtual Local Area Network (VLAN). TACLANE Trusted Sensor Software provides intrusion detection and prevention system capabilities that monitor network traffic, helping customers increase their knowledge of who and what is on their network. Agile VLAN allows users to simultaneously send and receive Layer 2 (Ethernet) and HAIPE traffic, helping to facilitate the flexible deployment of secure networks.

With an expected availability date mid-2017, GEM One, an enterprise-level remote encryptor management solution, enables users to configure and maintain a dispersed network of TACLANE encryptors, easing deployment and increasing network situational awareness. INEs are used extensively in the commercial and government sectors to protect critical networks and infrastructures.

"The diverse mission requirements of our customers warrant flexible products and solutions that address critical needs and are easy to use and deploy," said Paul Pittelli, NSA Chief, Information Assurance Capabilities. "The TACLANE-FLEX encryption platform enables customers to field a single device that allows for various levels of customization including its ability to support layer 2 communications while maintaining interoperability with currently deployed HAIPE devices."

General Dynamics' Customer Investment Protection Program encourages organizations protecting critical networks and infrastructure to maximize their investment and maintain their security posture by using General Dynamics' trade-in programs. A trade-in program will be offered for the TACLANE-FLEX, allowing users of the current HAIPE INEs to take advantage of the new customizable encryption platform's scalable speed and cybersecurity features. Call 888-897-3148 or email our team for additional information.

General Dynamics Mission Systems is a business unit of General Dynamics (NYSE: GD). For more information about General Dynamics Mission Systems, please visit gdmissionsystems.com and follow us on Twitter @GDMS.

View original content with multimedia:http://www.prnewswire.com/news-releases/general-dynamics-adds-new-nsa-certified-taclane-flex-type-1-network-encryption-platform-to-secure-product-portfolio-300495314.html

SOURCE General Dynamics Mission Systems

http://gdmissionsystems.com

Go here to see the original:
General Dynamics Adds New NSA-certified TACLANE-FLEX Type 1 Network Encryption Platform to Secure Product ... - PR Newswire (press release)

Indian IT firms value scaling encryption, lag in adoption: Study – Economic Times

NEW DELHI: Indian IT firms value scaling of data encryption but lag in adoption of the technology compared to the global average, says a study commissioned by French security technology firm Thales.

"95 per cent of organisations in India valued scalability for encryption solutions, which was much higher than any other country, global average of 29 per cent," the Global Encryption Trend study said.

However, it found that 82 per cent of organisations in India covered in the study embrace some type of encryption strategy while global average is of 86 per cent

The survey is based on responses from more than 5,000 IT security decision makers across multiple industry sectors in the United States, United Kingdom, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, Saudi Arabia and the United Arab Emirates and includes responses from 548 individuals in India.

"This study is part of a global initiative by Thales to educate leaders from the private and public sectors on the privacy and data protection practices companies can follow today," Thales, Country director India, Emmanuel de Roquefeuil said.

The company operates in strategic electronics and IT space with focus on high-end security. It is setting up manufacturing unit in India in partnership with Reliance Defence for making radar and electronic warfare display system for supply to Rafale Jet.

The study found that Indian firms led globally in adoption of cloud technology with 75 per cent of organisations transferring sensitive or confidential information to the cloud - whether encrypted or not - compared to global average of 53 per cent.

The top drivers for encryption in India are to protect against specific, identified threats and customer information.

"This is in contrast to the global data where compliance is, and historically always has been, the top driver for encryption. In India, compliance ranked third on the list at 55 per cent," the study said.

As per the study, 62 per cent of the respondents in India feel hardware security modules (HSMs) will be important in the next 12 months for encryption or key management strategy which is almost in line with global average of 61 per cent.

"This study is a call to action for organisations in India to strengthen their security position with strong data security and encryption plans in order to secure sensitive data and adhere to risk and compliance best practices and regulations," Thales e-Security, director for sales in South Asia, James Cook said.

Most of the Indian IT firms are of the view that top threat to sensitive data is from mistake of employees followed by hackers and temporary contract workers, the study said.

"Top threat to sensitive data continues to be employee mistakes (55 per cent of respondents), followed by hackers (36 per cent) and temporary or contract workers (31 per cent)," the study said.

The rest is here:
Indian IT firms value scaling encryption, lag in adoption: Study - Economic Times

Indian IT firms Embrace Encryption, Lacks Adoption: Study – CXOToday.com

Indian IT companies readily embrace data encryption but is at a back foot in the adoption of technology compared to global average, states a study by French security technology firm Thales.

The report reveals that organizations are increasingly adopting encryption to address compliance requirements and the escalating need to protect sensitive information from both internal and external threats and accidental disclosure.

95 per cent of organizations in India valued scalability for encryption solutions, which was much higher than any other country, global average of 29 per cent,noted the Global Encryption Trend study.

The study found that Indian organizations transfer sensitive or confidential information to the cloud whether encrypted or not at a rate that is the highest of all countries in the survey which is 70 percent while the global average is 53 percent.

the survey is based on responses from more than 5,000 IT security decision makers across multiple industry sectors in the United States, United Kingdom, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, Saudi Arabia and the United Arab Emirates and includes responses from 548 individuals in India.

As organizations embark on their digital transformation and embrace the cloud it is imperative that their most sensitive data remains secure and protected. This study is part of a global initiative by Thales to educate leaders from the private and public sectors on the privacy and data protection practices companies can follow today, said,Emmanuel de Roquefeuil, country director India, Thales.

The firm operates in strategic electronics and IT space with a focus on high-end security. It is setting up a manufacturing unit in India in collaboration with Reliance Defense for making radar and electronic warfare display system for supply to Rafale Jet.

The study highlights that the top drivers for encryption are to protect against specific, identified threats and to protect customer information. This is in contrast to the global data where compliance is, and historically always has been, the top driver for encryption. In India, compliance ranked third on the list at 55 percent.

IT operations (28 per cent of respondents) and IT security (27 per cent of respondents) have the most influence in directing encryption strategies in contrast to global data where business unit leaders have a higher influence over encryption strategy than IT operations, the study said.

Top threat to sensitive data continues to be employee mistakes (55 percent of respondents), followed by hackers (36 percent) and temporary/contract workers (31percent of respondents).

This study is a call to action for organizations in India to strengthen their security position with strong data security and encryption plans in order to secure sensitive data and adhere to risk and compliance best practices and regulations. Thales is a strong player in the Indian public sector banks and most private sector banks, securing their information with its Hardware Security Module (HSMs). It is estimated that over 90% of the card transactions in India are secured by Thales payment HSMs, said, James Cook, sales director South Asia, Thales e-Security.

In India, encryption deployment grew the most year-on-year in databases, big data, and email. Encryption of databases, Internet communications, and laptop hard drives are the most likely to be extensively deployed. In contrast, public cloud services and docker containers are least likely to be extensively or partially encrypted. 62 percent of the respondents say hardware security modules (HSMs) will be important in the next 12 months.

Original post:
Indian IT firms Embrace Encryption, Lacks Adoption: Study - CXOToday.com

Law enforcement radio encryption draws backlash – The Reflector

Pushback from the public regarding the encryption of law enforcement radio traffic has led to discussions about the decision, though its not likely that those channels will go back to being clear any time soon.

Clark Regional Emergency Services Agency completed a switch to an all-digital radio system in June, which among other things involved the encryption of all law enforcement channels for agencies that use CRESA for dispatch services.

The Law Enforcement Council of Clark and Skamania Counties made the decision to encrypt law enforcement channels, citing officer safety as the chief concern that led to it. Members of the public have spoken out about the decision, citing transparency among other concerns.

One local amateur radio enthusiast, Ryan Todd, sent a letter to different local government officials last week listing reasons why full encryption was a bad idea in his mind. Apart from having some police operations available for the public to monitor, managing the keys needed to access the encrypted channels can become costly, the letter read, and in the case of departments that do not have the encryption, the relay of communication could be delayed, compromising the usefulness of the system.

Another point touched on in the letter was how open channels can allow for community awareness. Todd mentioned in an interview that in certain situations having the feedback of the public can help in solving some types of issues.

The letter mentioned that in a recent interview Clark County Sheriff Chuck Atkins had estimated about 25,000 citizens use scanners. In perspective, the letter stated that the two most popular Facebook groups devoted to covering scanner traffic had a combined total of more than 42,000 followers.

That is an incredible amount of eyes and ears that we could have in the community that can help police officers deal with events that dont necessarily pose a risk to either officers or the public, Todd said.

Todd said that those in the scanner enthusiast community do understand the benefits of encryption in certain situations, but blocking out the public totally was not ideal.

If this is an officer safety issue, of course; use encryption. If this is not an officer safety issue, use your community, Todd said.

In between the public and the police chiefs is Clark County Undersheriff Michael Cooke. Cooke himself has a background in amateur radio and has taken an informal role as a liaison between members of the scanner community and local law enforcement leaders.

I cringe a little bit when I hear people that imply that this decision to encrypt has some sort of sinister motive because it absolutely did not, Cooke said.

Cooke recently had a meeting with one of the individuals in the scanner community where he said several concerns were able to be addressed, feeling positive about the chance for understanding on the issue.

Although that meeting went well, feedback from law enforcement doesnt look like there will be any clearing up of channels any time soon. Battle Ground Police Chief Bob Richardson is one of the local law enforcement leaders who is a proponent of encryption, having previous professional experience with it.

Coming from Orange County, California, where full encryption had been around for more than a decade, Richardson said in that instance there wasnt the same pushback as the decision in Clark County has garnered.

We dont make these decisions lightly, nor do we make them in a vacuum. We have had vigorous debate in our meetings with the other police chiefs and the sheriff about whats the right thing to do, Richardson said.

In regard to transparency concerns, Richardson mentioned the crime map on CRESAs website as an attempt to keep the public in the loop. Although not in real-time, the map shows where and why officers are dispatched.

One of local law enforcements chief arguments has been criminals use of scanners to circumvent attempts to catch them.

Weve stopped cars with people that are up to no good with the scanner apps listening to our radios, Richardson said, mentioning another instance where burglars had left their scanner behind at a crime scene.

Another issue Richardson felt was left out of the conversation was peoples right to privacy when they contact the police. He explained how in a situation like domestic violence or a suicide attempt, having the information of that call out on open airwaves could negatively affect members of the community.

Do you want that broadcast to the world live? Richardson asked. He added how in other situations sensitive information such as gate codes would need to be broadcast as well.

Overall, Richardson said that encrypting radios was something necessary with the changing times.

We live in a different world than we used to live in 20 years ago, and we have to protect our officers out in the street, Richardson said.

See original here:
Law enforcement radio encryption draws backlash - The Reflector

CIO Jury: Nearly 60% of companies don’t encrypt corporate emails – TechRepublic

Encryptiona process used to convert data from its original form to a format that is unreadable and unusable to anyone without the information needed to reverse itis often meant to prevent third parties from viewing or accessing data.

With the average cost of a data breach at $3.62 million, encryption has been shown to reduce the costs of an incident, according to a study from IBM Security and the Ponemon Institute. The Department of Defense recently announced that it will begin using a stronger email encryption technology starting in July 2018.

"If you're not making use of encryption with your email, you should be," wrote TechRepublic contributing writer Jack Wallen. "More and more sensitive information is being passed between recipients, much of which is being sent in plain-text form. That means one thing: anyone can read it. To thwart that, we turn to encryption technology that promises to obfuscate that sensitive information; and it works."

Despite the benefits, the majority of CIOs said that they are not using encryption for email messaging. When asked "Does your company encrypt emails?" seven members of our CIO Jury panel said no, while five said yes.

SEE: Encryption Policy (Tech Pro Research)

"I think we need 'critical mass' before we start doing this, and we certainly aren't the DoD," said Simon Johns, IT director at Sheppard Robson Architects LLP.

At Shealy Electrical Wholesalers, "long term, we want to implement it, but we have insufficient time and resources at present," said Jeff Focke, director of IT.

"We assume email is insecure communications," said Jeff Kopp, technology coordinator at Christ the King Catholic School.

On the other hand, Dustin Bolander, CIO at Technology Pointe, said his company has been encrypting emails for the past few years "due to regulatory requirements."

Others are newer to the technology. "We just started the process, using Microsoft tools," said Michael Hanken, vice president of IT at Multiquip Inc. "First impressions and feedback look very favorable."

The national conversation around encryption came to a head with the 2015 controversy between Apple and the FBI, in which Apple refused a court order to unlock the iPhone used by the San Bernardino shooter. The Justice Department eventually dropped its case against Apple, as it unlocked the phone with help from an outside party. Since then, a number of states have seen similar cases.

For the average user, encryption can be difficult to figure out, Wallen wrote. But companies can try and simplify encryption for email purposes, using tools such as SecureMyEmail.

This month's CIO Jury included:

Dan Fiehn, group IT director, Markerstudy Group

Michael Hanken, vice president of IT, Multiquip Inc.

Dustin Bolander, CIO, Technology Pointe

Jeff Kopp, technology coordinator, Christ the King Catholic School

Corey Peissig, vice president of technical operations, Optimal Blue

Mark Johns, former director of application systems design and development, Health Partners Plans

Jeff Focke, director of IT, Shealy Electrical Wholesalers

Mike S. Ferris, global IT director of infrastructure, Lincoln Electric

Simon Johns, IT director, Sheppard Robson Architects LLP

Shane Milam, executive director of technology infrastructure services, Mercer University

Gene Richardson, COO, Experts Exchange

Inder Davalur, group CIO, KIMS Hospitals Private Limited

Want to be part of TechRepublic's CIO Jury and have your say on the top issues for IT decision makers? If you are a CIO, CTO, IT director, or equivalent at a large or small company, working in the private sector or in government, and you want to join TechRepublic's CIO Jury pool, click the Contact link below or email alison dot denisco at cbsinteractive dot com, and send your name, title, company, location, and email address.

Image: iStockphoto/Prasit Rodphan

More:
CIO Jury: Nearly 60% of companies don't encrypt corporate emails - TechRepublic

Encryption Software Market to Grow at a CAGR of 17.9% by 2022 – Analysis By Application, Deployment Model … – Business Wire (press release)

DUBLIN--(BUSINESS WIRE)--The "Encryption Software Market - Forecasts from 2017 to 2022" report has been added to Research and Markets' offering.

Global Encryption Software market is projected to grow at a CAGR of 17.93% during the forecast period to grow to US$6.782 billion by 2022, increasing from US$2.974 billion in 2017. Encryption is an effective security mechanism that provides the data security.

The major factor driving the global encryption software market is the growing need to safeguard the critical data from the unauthorized access. Rising cases of cyber-attacks to steal the important organizational data is augmenting the demand for encryption software across enterprises.

Owing to increasing adoption of BYOD policy by various enterprises coupled with stringent cyber security regulations and guidelines is further boosting the growth of this market for secure data transmission. Emerging trend of cloud computing will further bolster the growth of cloud-based encryption software and solutions across SMEs and large enterprises over the next five years.

Geographically, North America held the largest market share in 2016 due to the strong presence of key encryption software vendors in the region. However, APAC region is anticipated to witness the fastest regional market growth during the forecast period. This growth is attributed to increasing number of smartphone and tablet users, growing adoption of social media, and penetration of IoT, cloud services, and implementation of BYOD policies across various enterprises in the region.

Companies Mentioned

Key Topics Covered:

1. Introduction

2. Research Methodology

3. Executive Summary

4. Market Dynamics

5. Global Encryption Software Market Forecast by Application (US$ billion)

6. Global Encryption Software Market Forecast by Deployment Model (US$ billion)

7. Global Encryption Software Market Forecast by Enterprise Size (US$ billion)

8. Global Encryption Software Market Forecast by End User (US$ billion)

9. Global Encryption Software Market Forecast by Geography (US$ billion)

10. Competitive Intelligence

11. Company Profiles

For more information about this report visit https://www.researchandmarkets.com/research/gwjkt9/encryption

See the rest here:
Encryption Software Market to Grow at a CAGR of 17.9% by 2022 - Analysis By Application, Deployment Model ... - Business Wire (press release)

Encryption laws: carrot, not stick, likely to work – iTWire

When Prime Minister Malcolm Turnbull and Attorney-General George Brandis get down to the nitty-gritty of formulating proposed changes to encryption laws which they have talked about, they might like to stop and consider one fact: most tech companies will bend over backwards if they have something to gain from it.

The case of Apple is illustrative. The company earned kudos from champions of personal privacy last year when it put up opposition to an FBI move to gain access to the contents of an iPhone which had been used by one of the terrorists involved in an incident in San Bernardino, California.

Annoyed by the FBI's move to take the matter to the courts, without first quietly approaching the company, Apple put up stiff resistance.

But the same Apple has now announced plans for opening a new data centre in China in order to comply with the government's demands to store Chinese customer data within the country. Despite the cost and inconvenience, Apple realises that there is a lot of money to be made in China.

Take the example of Microsoft. In May, the company released a version of its Windows operating system known as Windows 10 China Government Edition, a version vetted by the Beijing authorities and deemed suitable for use by the country's public sector.

There is plenty of money to be made by supplying operating systems to China's public sector; given that Microsoft was willing to show its crown jewels to the authorities. Money does indeed make the mare go.

One could go on. Practically every big tech company jumps through hoops when there is a pot of gold on the other side. Google, Facebook, Amazon, Yahoo!, they all say one thing in public, but buckle down to government demands provided there is something in it for them.

Given this, Turnbull and Brandis might like to think of some carrots that they can dangle in front of the tech companies whose encrypted products they are seeking access to. Wielding a stick, as Turnbull has done thus far, is unlikely to help.

Would your office survive without a phone, fax or email?

Avoid disruption and despair for your business.

Learn the NBN tricks and traps with your FREE 10-page NBN Business Survival Guide

The NBN Business Survival Guide answers your key questions:

When can I get NBN? Will my business phones work? Will fax & EFTPOS be affected? How much will NBN cost? When should I start preparing?

DOWNLOAD NOW!

Original post:
Encryption laws: carrot, not stick, likely to work - iTWire

IBM Z provides a simple way to encryption and fight Cybercrime – Irish Tech News

By Oscar Michel, Masters in Journalism, DCU

IBM unveiled on IBM Z, the next generation of the worlds most powerful transaction system, capable of running more than 12 billion encrypted transactions per day.

With IBM Z it is now possible to encrypt data associated with any apps, clouds or database.

The launch of IBM Z that took place in Armonk, NY on July 17th ushers in new era of data protection. $8 trillion of the global economy will be stolen via cybercrime by 2022. Since 2013, 9 billion data records were lost or stolen. Only 4% of the data records were encrypted making the data vulnerable to theft.

The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale. We created a data protection engine for the cloud era to have a significant and immediate impact on global data security said Ross Mauri, General Manager of IBM Z.

The main issue with encryption is that it can degrade the performance and therefore the users experience and can be too complex and expensive to manage. Only 2% of corporate data is encrypted today.

IBM Z brings significant advances in cryptography technology, building on a proven encryption platform that safeguards the worlds banking, healthcare, government and retail systems. IBM Z pervasive encryption delivers breakthroughs including Pervasive encryption of data at all times, tamper-responding encryption keys and encrypted APIs.

The General Data Protection Regulation(GDPR) will require organisations to report data breaches to the regulatory authority within 72 hours and face fines of up to 4% of annual worldwide revenues or 20 million Euro, unless the organisation can demonstrate that data was encrypted and the keys were protected.

The US Federal Institutions Examination Council (FFIEC) provides guidance on the use of encryption. Singapore and Hong Kong has done the same.The New York State Department of Financial Services published requirements regarding encryption in the Cybersecurity Requirements for Financial Services Companies.

The war against cybercrime has started and encryption is the solution.

IBM Z also created the most secure Blockchain Service byrunning IBM Blockchain services to provide the highest commercially available levels of cryptographic hardware.

The powerful combination of IBM Z encryption and secure containers differentiates IBM Blockchain services on the cloud by supporting the trust models new blockchain networks require, said Marie Wieck, general manager, IBM Blockchain. Enterprise clients also benefit from the ease of use making management transparent to the application and the user.

Regarding to the Transaction System for the Cloud Era, enormous amountsof sensitive data produced by transactions can now be better protected against fraud and cybercrime, analysed, and monetised using IBM Z. Encryption will be easy, fast and wont impact to service level agreements.

IBM has also announced new Container Pricing models for IBM Z. Microservices and applications will enable clients to maximise the value from security-rich on premises entreprise systems in real time.Application development and test with the freedom to triple capacity of all development environments on z/OS to support latest DevOps tooling and processes.Payment systems pricing based on the business metric of payments volume a bank processes, not the available capacity.

If you would like to have your company featured in the Irish Tech News Business Showcase, get in contact with us at [emailprotected] or on Twitter: @SimonCocking

BankingBlockchainBusinessCloudDataHackingIBMIBM ZInternetSecurity

Visit link:
IBM Z provides a simple way to encryption and fight Cybercrime - Irish Tech News

Soon-to-launch communications network said to be ‘unhackable’ – Newser


Newser
Soon-to-launch communications network said to be 'unhackable'
Newser
These aren't real people, but rather the names commonly used in scenarios describing quantum cryptography, a type of technology surpassing traditional encryption in terms of keeping communications networks safe from hackers. It's a technology that ...
China's New Quantum Communication Network Will Be UnhackableFuturism
Unhackable Chinese Communication Network Launches SoonEdgy Labs (blog)
China To Launch 'Unhackable' Quantum Computer NetworkLADbible (blog)
Livemint -International Business Times UK -News4C
all 11 news articles »

Excerpt from:
Soon-to-launch communications network said to be 'unhackable' - Newser