• September 24, 2018

Security

security Security

The power of terminal emulation in 2018: simplifying security, facilitating compliance

While organizations have been using terminal emulation on mainframes for 30+ years, the tech landscape has certainly changed around them. The good news is that terminal emulators have evolved dramatically as well. Suffice it to say that for many large organizations, mainframes continue to be a very secure and viable option for running mission-critical programs […]

security Security

George Clooney, healthcare, security & mainframes

The recent launch of IBM’s z14 demonstrates to me just how important mainframes really are in the world of corporate computing. After all, when CNBC, the Wall Street Journal and even Wired label a new computer a game-changer, you know this latest mainframe must be a game changer. While most of the attention has been […]

IBM z14 mainframe Security

The new IBM z14 mainframe: real security for the real world

Achieving perfect digital security is actually pretty easy. All you need to do is to keep your machine completely isolated from the Internet, or even from other computers. While you’re at it, you should also get rid of any removable storage devices. After all, you can’t break into a house with no doors and windows. […]

Multi-factor authentication Security

Multi-factor authentication: protecting your data in the cloud

IBM just announced that its new z13 and z13s systems are optimized for the hybrid cloud. This is a good thing, but every time someone utters the word “cloud,” the same issue gets raised: how can data be secure in the cloud? As a mainframe security professional, I think about this problem a lot. I […]

security Security

Live from IBM Insight2015: Security and compliance in a cloud-driven world

Unless you’ve been living under a rock for the last couple of years, security is one of the hottest topics when it comes to connected services and data. Attendees of IBM Insight2015 (#ibminsight) have had the opportunity to learn how IBM and their partners, such as Rocket Software, are delivering security and compliance to their customers […]

Security

Live from IBM Insight2015: when was the last time you read a privacy policy?

This was a question posed today at an Insight session on data-centric security and privacy. The issue is vexing, and it is rapidly becoming more so. Consider this: most countries have privacy legislation. Some, like the US, are industry focused. Others, like EU nations, are more oriented on individual rights. But while they all set […]

MIrroring Security

Why mirroring alone falls short for adequate data protection

We held a very informative webinar recently on DASD backup and recovery for z/OS environments. One of the questions that came up was “why do I need your backup and recovery solution when I already mirror to another site?” This question is certainly not uncommon. Many of our account executives say that they run into […]

Security

InterConnect breakout sessions: What’s happening with IoT, mobile, and security?

During my visit to IBM’s InterConnect this week I attended many events, connected with customers and learned a lot about the present and future of the IT industry. Apart from the keynotes that I watched and blogged about earlier, I also made sure to join many of the Breakout Sessions offered. Breakout sessions were typically […]

Security

Leaving Las Vegas

As I get ready to fly home to Boston, I just wanted to share my thoughts about the great week that Rocket Software just had at IBM InterConnect 2015. This is one of the most important software industry conferences of the year, and I leave this week inspired by the breadth and depth of content […]

Security

IBM InterConnect keynote: Security for a new era of computing

Security Intelligence is a major theme at this year’s IBM InterConnect conference, and it took center stage in Tuesday morning’s keynote address by Brendan Hannigan, General Manager of IBM’s Security division. Hannigan addressed what IBM considers to be four “myths” that prevent organizations from thinking realistically about information security, and from discussing related risks in […]