Pervasive Encryption and IMS - An Update
Project and Program: Information Management
, Information Management Systems
, SHARE Pittsburgh 2019
Regulatory and industry standards press for more and more safety around customer and company data . The Pervasive Encryption model with IMS datasets requires some planning. IMS is unique in many ways and keeping the IMS Infrastructure safe is as important as keeping its databases safe. This session discusses IMS data, logging and utility use from an encryption point of view: What can be encrypted? What can’t be encrypted? Why should it be encrypted? A brief rundown on implementation steps.
Complete the survey for this session towards earning the Security Warrior digital badge: http://bit.ly/SHARE25749-Dennis Eichelberger-IBM Corporation
Back to Proceedings File Library