Pervasive Encryption and IMS - An Update
				Project and Program: 
Information Management, 
Information Management Systems
				Tags: 
Proceedings, 
SHARE Phoenix 2019, 
2019
		
		
		
			
		Regulatory and industry standards press for more and more safety around customer and company data . The Pervasive Encryption model with IMS datasets requires some planning.  IMS is unique in many ways and keeping the IMS Infrastructure safe is as important as keeping its databases safe.  This session discusses IMS data, logging and utility use from an encryption point of view:  What can be encrypted?  What can’t be encrypted?  Why should it be encrypted? A brief rundown on implementation steps.-Dennis Eichelberger-IBM Corporation
		
		
		
		
		
		
	
 Back to Proceedings File Library