Database Encryption on z/OS for IMS and DB2
Project and Program: Information Management
, Information Management Systems
, SHARE Atlanta 2016
Encrypting sensitive data in databases is no longer optional. Data encryption has become a business imperative. Is your organization looking to secure intellectual property, comply with privacy or regulatory mandates, or simply guard against damage associated with data breaches? In any of those scenarios, database encryption is a key requirement. In this session, the speaker will compare and contrast the encryption options for DB2 and IMS databases on z/OS systems.
1. Understand the options for encrypting DB2 and IMS databases on z/OS.
2. Be able to evaluate the benefits of hardware vs. software encryption techniques.
3. Understand the difference between available encryption algorithms.
4. Understand the process of implementing database encryption on z/OS-Thomas Hubbard-Rocket Software
Back to Proceedings File Library