Is Your IMS and DB2 At Rest Data on z System Secure? Be Sure!
Project and Program: Information Management
, Information Management Systems
, SHARE Atlanta 2016
How secure is your At Rest Data? The proliferation of data across databases, warehouses, off-site backups, mobile devices and more can make it an attractive target. As one of your company's largest assets, At Rest Data can be exposed to unauthorized access and use. In this presentation, learn a two pronged approach: keeping your At Rest Data unreadable and unusable in a z/OS environment and monitoring potential unauthorized accesses of that data. You will learn the details of encryption techniques that can protect your data and methods of monitoring out of the ordinary access of databases and copies allowing better reaction to potential data breach.-Dennis Eichelberger-IBM Corporation
Back to Proceedings File Library