What's New in z Systems Crypto: Enterprise Key Management Edition
				Project and Program: 
Enterprise Data Center, 
Security and Compliance
				Tags: 
Proceedings, 
SHARE Providence 2017, 
2017
		
		
		
			
		Encryption is based on solid algorithms and cryptographic keys. Cryptographic  algorithms are public, so the security of sensitive data is dependent on the security of the cryptographic keys. Join us in this session for a discussion on the different key management activities and a few tools and tricks to make key management easier.-Eysha Shirrine Powers-IBM
		
		
		
		
		
		
	
 Back to Proceedings File Library