A good example of how z System is keeping up with encryption and making it even 
easier to use can be seen in the brief summary in "Preview: IBM z/OS Version 2 
Release 3" at 
http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&infotype=an&supplier=897&letternum=ENUS217-085
 .  It has this information about plans to make it easy to keep data encrypted 
with a minimum of work on the part of the system owner or programmer.

========= Begin clipped text ==========
New approach to encryption
---------------------------------

The threat of data breaches in conjunction with compliance mandates are driving 
the need for clients to adopt extensive use of encryption across their 
enterprises. z/OS V2.3 plans to replace application development efforts with 
transparent, policy-based data set encryption:

* Planning enhanced data protection for z/OS data sets, zFS file systems, and 
Coupling Facility structures to give users the ability to encrypt data without 
needing to make costly application program changes.

* Designing new z/OS policy controls to make it possible to use pervasive 
encryption to protect user data and simplify the task of compliance.

* z/OS Communications Server will be designed to include encryption readiness 
technology to enable z/OS administrators to determine which TCP and Enterprise 
Extender traffic patterns to and from their z/OS systems meet approved 
encryption criteria and which do not.
========= End clipped text ==========
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to