IBM Mainframe Ushers in Fresh Era of Data Protection

IBM Mainframe Ushers in Fresh Era of Data Protection

  • Breakthrough: Pervasively encrypts data, all the time at any scale
  • Addresses global data breach epidemic; helps automate compliance for EU General Data Protection Regulation, Federal Reserve and other emerging regulations
  • Encrypts data 18x quicker than compared x86 platforms, at five percent of the cost [1]
  • Announces six IBM Cloud Blockchain data centers with IBM Z as encryption engine
  • Supplies groundbreaking Container Pricing for fresh solutions, such as instant payments

ARMONK, NY – seventeen July 2017: IBM (NYSE: IBM) today unveiled IBM Z, the next generation of the world’s most powerful transaction system, capable of running more than twelve billion encrypted transactions per day. The fresh system also introduces a breakthrough encryption engine that, for the very first time, makes it possible to pervasively encrypt data associated with any application, cloud service or database all the time.

IBM mainframe ushers in fresh era of data protection. #trustIBMz Tweet

IBM Z’s fresh data encryption capabilities are designed to address the global epidemic of data breaches, a major factor in the $8 trillion cybercrime influence on the global economy by 2022. Of the more than nine billion data records lost or stolen since 2013, only four percent were encrypted, making the vast majority of such data vulnerable to organized cybercrime rings, state actors and employees misusing access to sensitive information.

In the most significant re-positioning of mainframe technology in more than a decade, when the platform embraced Linux and open source software, IBM Z now dramatically expands the protective cryptographic umbrella of the world’s most advanced encryption technology and key protection. The system’s advanced cryptographic capability now extends across any data, networks, outer devices or entire applications – such as the IBM Cloud Blockchain service – with no application switches and no influence on business service level agreements.

“The vast majority of stolen or leaked data today is in the open and effortless to use because encryption has been very difficult and expensive to do at scale,” said Ross Mauri, General Manager, IBM Z. “We created a data protection engine for the cloud era to have a significant and instant influence on global data security.”

Technology Breakthrough: Industry-First Pervasive Encryption for the Cloud Era

A latest examine found that extensive use of encryption is a top factor in reducing the business influence and cost of a data breach. To put that in context, the IBM X-Force Threat Intelligence Index reported that more than four billion records were leaked in two thousand sixteen (a five hundred fifty six percent increase from 2015).

Read More of the IBM Z Press Release

However, encryption is often largely absent in corporate and cloud data centers because current solutions for data encryption in x86 environments can dramatically degrade spectacle (and thus user practice), and can be too complicated and expensive to manage. As a result, only about two percent of corporate data is encrypted today, while more than eighty percent of mobile device data is encrypted [1].

IBM Z pervasive encryption reflects a call to act on data protection articulated by Chief Information Security Officers and data security experts worldwide, and more than one hundred fifty IBM clients around the world who participated and provided feedback in IBM Z’s system design over three years.

As a result of this collaboration, IBM Z brings significant advances in cryptography technology, building on a proven encryption platform that safeguards the world’s banking, healthcare, government and retail systems. IBM Z pervasive encryption supplies breakthroughs including:

  • Pervasive encryption of data – all the time. IBM Z makes it possible, for the very first time, for organizations to pervasively encrypt data associated with an entire application, cloud service or database in flight or at rest with one click. The standard practice today is to encrypt petite chunks of data at a time, and invest significant labor to select and manage individual fields. This bulk encryption at cloud scale is made possible by a massive 7x increase in cryptographic spectacle over the previous generation z13 – driven by a 4x increase in silicon dedicated to cryptographic algorithms. This is 18x quicker than compared x86 systems (that today only concentrate on limited slices of data) and at just five percent of the cost of compared x86-based solutions [1].
  • Tamper-responding encryption keys. A top concern for organizations is protection of encryption keys. In large organizations, hackers often target encryption keys, which are routinely exposed in memory as they are used. Only IBM Z can protect millions of keys (as well as the process of accessing, generating and recycling them) in “tamper responding” hardware that causes keys to be invalidated at any sign of intrusion and can then be restored in safety. The IBM Z key management system is designed to meet Federal Information Processing Standards (FIPS) Level four standards, where the norm for high security in the industry is Level Two. This IBM Z capability can be extended beyond the mainframe to other devices, such as storage systems and servers in the cloud. In addition, IBM Secure Service Container protects against insider threats from contractors and privileged users, provides automatic encryption of data and code in-flight and at-rest, and tamper-resistance during installation and runtime.
  • Encrypted APIs. IBM z/OS Connect technologies make it effortless for cloud developers to detect and call any IBM Z application or data from a cloud service, or for IBM Z developers to call any cloud service. IBM Z now permits organizations to encrypt these APIs – the digital glue that links services, applications and systems – almost 3x quicker than alternatives based on compared x86 systems [Two].

“The pervasive encryption that is built into, and is designed to extend beyond, the fresh IBM Z truly makes this the very first system with an all-encompassing solution to the security threats and breaches we’ve been witnessing in the past twenty four months,” said Peter Rutten, analyst at IDC’s Servers and Compute Platforms Group.

Designed for Raunchy Fresh Data Protection Regulations

The IBM Z also helps clients build trust with consumers and conform with fresh standards such as the EU’s General Data Protection Regulation (GDPR) that will increase data protection requirements for organizations doing business in Europe beginning next year. GDPR will require organizations to report data breaches to the regulatory authority within seventy two hours and face fines of up to four percent of annual worldwide revenues or twenty million Euro, unless the organization can demonstrate that data was encrypted and the keys were protected. At the U.S. Federal level, the Federal Financial Institutions Examination Council (FFIEC), which includes the five banking regulators, provides guidance on the use of encryption in the financial services industry. Singapore and Hong Kong have published similar guidance. More recently, the Fresh York State Department of Financial Services published requirements regarding encryption in the Cybersecurity Requirements for Financial Services Companies.

IBM Z, deeply integrated with IBM Security software, automates and dramatically streamlines security and compliance processes. For example, auditors are expected to by hand inspect and validate the security of databases, applications and systems. Organizations can now instantly demonstrate that data within the scope of compliance is protected and the keys are secure. This can significantly reduce the mounting complexity and cost of compliance for auditors. The system also provides an audit trail demonstrating if and when permissioned insiders accessed data.

Creating the Most Secure Blockchain Service

As blockchain applications become increasingly integrated into core business processes, client’s concerns are naturally shifting to security, encryption, and resiliency. The IBM Cloud is permanently evolving with industry leading compute options. Now it is evolving again to bring IBM Z onto the IBM Cloud, launching primarily as an encryption engine for cloud services and to run IBM Blockchain services to provide the highest commercially available levels of cryptographic hardware. Fresh blockchain services in centers in Dallas, London, Frankfurt, Sao Paolo, Tokyo and Toronto are secured using IBM Z’s industry-leading cryptography technology.

“The powerful combination of IBM Z encryption and secure containers differentiates IBM Blockchain services on the cloud by supporting the trust models fresh blockchain networks require,” said Marie Wieck, general manager, IBM Blockchain. “Enterprise clients also benefit from the ease of use making management see-through to the application and the user.”

AngelHack, in collaboration with IBM, today launched “Unchain the Framework,” a global virtual hackathon with more than $50,000 USD in prizes. Developers from around the world are invited to display off their abilities and creativity using technologies such as blockchain, open source applications, financial industry APIs and machine learning on IBM Z.

Fresh: Predictable and See-through Container Pricing

IBM also announced three groundbreaking fresh Container Pricing models for IBM Z, providing clients greatly simplified software pricing that combines nimble deployment with competitive economics vs. public clouds and on-premises x86 environments:

  • Fresh microservices and applications that enable clients to maximize the value from security-rich on-premises enterprise systems in real time. Clients can now co-locate applications to optimize qualities of services that are priced competitively with public cloud and on-premises platforms.
  • Application development and test with the freedom to triple capacity of all development environments on z/OS to support latest DevOps tooling and processes. Clients can triple capacity with no increase in monthly license charge.
  • Payment systems pricing based on the business metric of payments volume a bank processes, not the available capacity. This gives clients much greater plasticity to innovate affordably in a competitive environment, particularly in the fast-growing Instant Payment segment.

These precedent-setting Container Pricing options are designed to give clients the predictability and transparency they require for their business. The pricing models are scalable both within and across logical partitions (LPARs) and supply greatly enhanced metering, capping and billing capabilities. Container Pricing for IBM Z is planned to be available by year-end two thousand seventeen and enabled in z/OS V2.Two and z/OS V2.Three.

The Most Powerful Transaction System for the Cloud Era

IBM Z builds on the capabilities of the world’s most powerful transaction engine at the center of global commerce today supporting:

  • 87 percent of all credit card transactions and almost $8 trillion payments a year.
  • 29 billion ATM transactions each year, worth almost $Five billion per day.
  • Four billion passenger flights each year.
  • More than 30 billion transactions per day – more than the number of Google searches every day.
  • 68 percent of the world’s production workloads at only six percent of the total IT cost.

Banks and others in the financial services industry process thousands of transactions per 2nd to keep the world’s financial systems running. The mainframe is more critical than ever for reliably treating high volumes of transaction data.

Ninety-two of the world’s top one hundred banks rely on the IBM mainframe because of its capability to efficiently process fat volumes of transactions. To help financial services organizations more effectively rival in the cloud era, enormous amounts of sensitive data produced by transactions can now be better protected against fraud and cybercrime, analyzed, and monetized using IBM Z – without causing disruption of day-to-day operations. For banks, this means encryption at the click of a button — even while applications are running — and the capability to migrate data from unencrypted to encrypted with no influence to service level agreements.

The IBM Z, the next generation of IBM’s industry-leading CMOS mainframe technology, features the industry’s fastest microprocessor, running at Five.2GHz, and a fresh scalable system structure that supplies up to a thirty five percent capacity increase for traditional workloads and a up to a thirty five percent capacity increase for Linux workloads compared to the previous generation z13. The system can support:

  • More than 12 billion encrypted transactions per day on a single system.
  • The world’s largest MongoDB example with Two.5x quicker NodeJS spectacle than compared x86-based platforms.
  • Two million Docker Containers.
  • 1,000 concurrent NoSQL databases.

Other fresh available capabilities announced today include:

  • Three times the memory of the z13 for swifter response times, greater throughput and accelerated analytics spectacle. With 32TB of memory, IBM Z offers one of the largest memory footprints in the industry.
  • Three times quicker I/O and accelerated transaction processing compared to the z13 to drive growth in data, transaction throughput and lower response time.
  • The capability to run Java workloads 50 percent swifter than x86 alternatives [Trio].
  • Industry-leading Storage Area Network response time with zHyperLink, delivering 10x latency reduction compared to the z13 and cutting application response time in half – enabling businesses to do much more work such as real-time analytics or interact with Internet of Things (IoT) devices and cloud applications within the same transaction, without switching a single line of application code [Four].

As part of today’s announcement, IBM also previewed fresh z/OS software that provides foundational capabilities for private cloud service delivery, enabling a transformation from an IT cost center to a value-generating service provider. When available, these capabilities will include the support of workflow extensions for IBM Cloud Provisioning and Management for z/OS and real-time SMF analytics infrastructure support.

IBM Global Financing can help credit-qualified clients acquire the fresh IBM Z, lower their total cost of ownership, and accelerate comeback on investment. IBM Global Financing offerings for IBM mainframe solutions are available from IBM and IBM Business Playmates, and provide nimble terms and conditions that can be customized to align cost to project benefits or other client needs.

  • Source: “Pervasive Encryption: A Fresh Paradigm for Protection,” K. R. E. Lind, Chief Systems Engineer, Solitaire Interglobal Ltd., June 30, 2017.
  • Customers running WebSphere Liberty on z14 Linux on z using clear key encryption AES_128_GCM cipher can get up to Two.6X improvement in throughput per core with IBM Java eight SR5 compared to x86. Spectacle results based on IBM internal tests running DayTrader three with WebSphere Liberty 8.Five.Five.9 using SSL clear key and TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 cipher. Liberty DayTrader three measurements were performed on a standalone dedicated LPAR on IBM z14 running SLES twelve SP1 with four IFLs configured with SMT for a total of eight hardware threads. Liberty used IBM 64-bit SDK for z/OS, Java Technology Edition, Version eight Service Refresh five (Java eight SR5). The compared x86 DayTrader three on Liberty measurements were performed on a standalone WebSphere Liberty 8.Five.Five.9 server on Intel(R) Xeon(R) CPU E5-2690 v4 @ Two.60GHz, HyperThreading enabled, four cores/8 hardware threads, 97GB of memory, RHEL 7.Two, and HugePages enabled. Liberty used OpenJDK 8_131. A 2nd x86 system ran DB2 V10.1 used to persist application data. This 2nd x86 system was an Intel(R) Xeon(R) CPU E7- two thousand eight hundred thirty @ Two.13GHz, No HyperThreading, CPUs: eight physical cores and eight logical cores, 16GB of memory, and RHEL Five.7. A third x86 system ran JMeter-2.12 to drive the DayTrader three workload. This third x86 system was an Intel(R) Xeon(R) CPU E5-2650 v2 @ Two.60GHz, HyperThreading enabled, CPUs: sixteen physical cores & thirty two logical cores, 197GB of memory, RHEL seven GA x86-64. All network traffic was over 10GB Network.
  • Customers running WebSphere Liberty on z14 Linux on z without encryption can get up to 1.6X improvement in throughput per core with IBM Java eight SR5 compared to x86. Spectacle results based on IBM internal tests running DayTrader three with WebSphere Liberty 8.Five.Five.9 using SSL clear key and TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 cipher. Liberty DayTrader three measurements were performed on a standalone dedicated LPAR on IBM z14 running SLES twelve SP1 with four IFLs configured with SMT for a total of eight hardware threads. Liberty used IBM 64-bit SDK for z/OS, Java Technology Edition, Version eight Service Refresh five (Java eight SR5). The compared x86 DayTrader three on Liberty measurements were performed on a standalone WebSphere Liberty 8.Five.Five.9 server on Intel(R) Xeon(R) CPU E5-2690 v4 @ Two.60GHz, HyperThreading enabled, four cores/8 hardware threads, 97GB of memory, RHEL 7.Two, and HugePages enabled. Liberty used OpenJDK 8_131. A 2nd x86 system ran DB2 V10.1 used to persist application data. This 2nd x86 system was an Intel(R) Xeon(R) CPU E7- two thousand eight hundred thirty @ Two.13GHz, No HyperThreading, CPUs: eight physical cores and eight logical cores, 16GB of memory, and RHEL Five.7. A third x86 system ran JMeter-2.12 to drive the DayTrader three workload. This third x86 system was an Intel(R) Xeon(R) CPU E5-2650 v2 @ Two.60GHz, HyperThreading enabled, CPUs: sixteen physical cores & thirty two logical cores, 197GB of memory, RHEL seven GA x86-64. All network traffic was over 10GB Network.
  • The 10x lower read latency projection was based on z14 and zHyperLink results with DS8886 and z13 measurements that provided results for I/O interrupt and dispatching. This response time projection was based on IBM internal measurements and projections that contrasted zHyperLink Express with a similar configuration using zHPF. The measurements and projections assume that assume 75% or more of the workload response time is associated with read DASD I/O and the storage system random read cache hit ratio is above 80%. The execution environment for both scripts was a z14 with ten CPs. The zHPF tests used FICON Express 16S+ connected to a DS8886. The zHyperLink tests were also conducted using DS8886. The actual spectacle that any user will practice may vary.

IBM Global Financing offerings are provided through IBM subsidiaries and divisions worldwide to qualified commercial and government clients. Rates and availability are based on a client’s credit rating, financing terms, suggesting type, equipment and product type and options, and may vary by country. Non-hardware items must be one-time, non-recurring charges and are financed by means of loans. Other confinements may apply. Rates and offerings are subject to switch, extension or withdrawal without notice and may not be available in all countries. IBM and IBM Global Financing do not, nor intend to, suggest or provide accounting, tax or legal advice to clients. Clients should consult with their own financial, tax and legal advisors. Any tax or accounting treatment decisions made by or on behalf of the client are the foot responsibility of the client.

IBM, the IBM logo, ibm.com, IBM Z and z14 are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. For a current list of IBM trademarks, please see http://www.ibm.com/legal/copytrade.shtml

All other company, product or service names may be trademarks or registered trademarks of others. Statements concerning IBM’s future development plans and schedules are made for planning purposes only, and are subject to switch or withdrawal without notice. Reseller prices may vary.

Related video:

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *