Protection Begins with Data at the Center: Encrypt it all with z Systems Pervasive Encryption


Available On Demand

Duration:30 minutes


The world is built upon an intrinsic trust that we, as clients and consumers, have in the businesses we deal with.  Trust that our banks will always maintain accurate balances and transaction data on our accounts.  Trust that our insurance company will be able to find their policy records when needed.  Trust that the airline will have our check-in information months after the reservation was made.  Can you imagine what it would be like without this trust?


Though the financial impact of a data breach is daunting at an average of $4M per event, cyber attacks threaten to undermine this fundamental principle. Strong walls and perimeter defenses are no longer adequate to shield organizations from attack. And with industries and governments trying to ensure this trust is maintained, regulations are becoming more complex, costly, and time consuming.


In today’s threat landscape, organizations need to consider a new security paradigm - one with data at the center. An effective cyber security strategy has to start with protecting the data. Attend this webcast to learn:

⁃ How protecting data is the new security paradigm you need to consider
⁃ How pervasive encryption can simplify your security strategy
⁃ How you can encrypt everything without changing anything




Michael Jordan

Distinguished Engineer - z Systems Security


Michael Jordan is a Distinguished Engineer in IBM z Systems. Michael has over 27 years of z Systems experience. This includes 23 years of development experience and 4 years in a client facing role leading complex and large scale z Systems projects. Michael’s expertise and passion are in the areas of z Systems Security, Cryptography, and Parallel Sysplex. He holds over 20 patents, and has been co-author for several journal articles related to his work. 


Facebook LinkedIn Twitter YouTubeGoogle+

Email Address
First Name
Last Name
Job Title
Postal Code
Attendee Type
Work Phone


Protection Begins with Data at the Center: Encrypt it all with z Systems Pervasive Encryption

By submitting this form I agree that IBM may process my data in the manner indicated above and as described in
IBM's Privacy statement.

© Copyright 2017 INXPO, Inc. All rights reserved.