Mainframes Make the Extraordinary Possible
Published on March 3, 2014
No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for…
The Mainframe Turns 50
Published on February 12, 2014
2014 is a big year for tech anniversaries. There was a big celebration for the 30th anniversary of the Mac, which changed personal computing forever and the way people felt about their computers. There was also the 10th anniversary of Facebook, which changed the way…
Common Misconceptions About Multi-Factor Authentication
Published on February 5, 2014
Although multi-factor authentication has been repeatedly proven to be a more secure way to protect user accounts from hackers, many common misconceptions still prevail about what counts as strong multi-factor authentication. Some account security measures that by themselves are weak multi-factor authentication, at best, include:…
Physical Security for Mainframes
Published on January 29, 2014
On this blog, we've discussed many of the important elements of data security, including encryption, access controls, multi-factor authentication, password management, and many others. However, no data security strategy is complete without physical control over the hardware. A comprehensive data security system requires physical control…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
2013 Was a Year of Big Data Breaches
Published on January 20, 2014
There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…
The Future of the Mainframe
Published on January 2, 2014
For the past two decades, the mainframe has been on a constant deathwatch with IT "experts" and analysts regularly predicting its downfall and extinction. However, the mainframe, both as a style of hardware and as a computing platform, has survived, thrived, and evolved to overcome…
Mainframe Access Management
Published on December 23, 2013
One of the most compelling features of the mainframe is how it allows so many processes to run simultaneously. The mainframe's design allows it to have many users performing a variety of actions day after day without rest. Because mainframes are able to do so…
Protecting Mission Critical Systems Through Data Encryption
Published on December 20, 2013
Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…
Who’s Already Using Encryption?
Published on December 17, 2013
If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…