Search for tag: "cryptography"

How can you ensure your z/OS network traffic is properly protected? zERT has the answer!

As you extend your Pervasive Encryption for IBM Z® strategy to your z/OS network traffic, it is imperative to assess and understand the quality of the cryptographic network protection being…

From  2700024GAM 2700024GAM on September 16th, 2020 3 plays

Meet the Mainframe - Engines (z15)

A business-focused architecture, specialty engines, and crypto capabilities to keep it all protected. In this video, learn all about how the mainframe is engineered to get results. Content Owner:…

From  508QS5EXMC 508QS5EXMC on July 13th, 2020 408 plays

Blockchain Explained

Blockchain provides users a more secure record, called blocks, of their transactions that are linked using cryptography. Each block contains a cryptographic hash of previous block, a timestamp, and…

From  5500021X6T 5500021X6T on August 16th, 2019 12 plays