{"id":32918,"date":"2017-08-09T21:44:15","date_gmt":"2017-08-10T01:44:15","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/heres-why-ibm-z-mainframe-wants-to-encrypt-the-world-edgy-labs-blog.php"},"modified":"2017-08-09T21:44:15","modified_gmt":"2017-08-10T01:44:15","slug":"heres-why-ibm-z-mainframe-wants-to-encrypt-the-world-edgy-labs-blog","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/heres-why-ibm-z-mainframe-wants-to-encrypt-the-world-edgy-labs-blog.php","title":{"rendered":"Here&#8217;s why IBM Z Mainframe Wants to Encrypt the World &#8211; Edgy Labs (blog)"},"content":{"rendered":"<p><p>IBMs new approach to fight cyber criminals is a mainframe    that enables encryption of an entire dataset and renders it    useless to hackers.    <\/p>\n<p>    Hackers are everywhere and even ships in high seas can be compromised by    their malicious deeds.  <\/p>\n<p>    According to IBM X-Force Threat Intelligence    Index, more than 4 billion records were leaked in 2016    alone, which is over a 500% increase from the previous year.  <\/p>\n<p>    As cyber criminals keep on keeping up with security companies,    theres urgent need to find novel approaches and    countermeasures.  <\/p>\n<p>    Think about it: if all sensitive data is efficiently encrypted    and hackers cant decrypt it, they wouldnt be able to take    advantage. Their attempts to breach security systems would be    pointless.  <\/p>\n<p>    A recent study by thePonemon Institute    reveals that, after using effective incident response teams,    the extensive use of encryption is the second factor in    reducing the cost of data breach (by anaverage of $16 USD    per record).  <\/p>\n<p>    However some companies show passivity when it comes to data    encryption; some just dont bother, while others cant afford    to encrypt everything.  <\/p>\n<p>    Current data encryption solutions (on-premises or cloud-based) can degrade    systems performance, aside from being too complex and costly to    deploy in the first place.  <\/p>\n<p>    As a result, IBM estimates that, since 2013, of over 9 billion    data records stolen, only 4% of the data was ever encrypted,    and the company wants to remedy this.  <\/p>\n<p>    IBMs security solutions span the whole spectrum, from hardware    and software to web services, but the company has a universal    encryption approach to the problem of data protection.  <\/p>\n<p>    As a leading tech company, IBM wants to put an end to the    global pandemic of security breaches and to do that it is    betting on full encryption of sensitive data.  <\/p>\n<p>    IBM has been making significant progress in cryptographic    technology, mainly with its Z series mainframes. We    just witnessed the introduction of the 14th    generation of thesystem.  <\/p>\n<p>    Called IBM    Z, or z14, the mainframe is a system that enables the    encryption of all data contained in databases, apps or the    cloud, at any time, with just one-click.  <\/p>\n<p>    Powered with a novel encryption engine, IBM Z is much faster    and can run 12 billion encrypted transactions per day, without    being a detriment to performance.  <\/p>\n<p>    The IBM Z boasts many other features, including Blockchain    technology, for businesses of any scale to make use of it.  <\/p>\n<p>    Nevertheless, IBMs full encryption system might not keep    hackers totally at bay. Cyber attacks can still target    sensitive encrypted data and steal it.  <\/p>\n<p>    It remains to be seen if hackers would ever be able to decrypt    it.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/edgylabs.com\/why-ibm-wants-to-encrypt-the-world\/\" title=\"Here's why IBM Z Mainframe Wants to Encrypt the World - Edgy Labs (blog)\">Here's why IBM Z Mainframe Wants to Encrypt the World - Edgy Labs (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IBMs new approach to fight cyber criminals is a mainframe that enables encryption of an entire dataset and renders it useless to hackers. Hackers are everywhere and even ships in high seas can be compromised by their malicious deeds. According to IBM X-Force Threat Intelligence Index, more than 4 billion records were leaked in 2016 alone, which is over a 500% increase from the previous year<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32918","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32918"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32918"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32918\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}