Ransomware is Everybodys Problem How to Protect Your Data on IBM zSystems

Published: Sept. 8, 2022, 5 p.m.

b'

Ransomware is real. Years of ever-increasing cyberattacks have made cyber resiliency top-of-mind. Chances are your most-important data resides on your IBM zSystems platform. How do you protect it? Architectural concepts around air-gapped, third data copies \\u2014 sometimes referred to as \\u201csafe harbor\\u201d or \\u201ccyber vault\\u201d \\u2014 have become very popular. Join us as we dive deep on how cloud object storage can provide an additional fast, secure, and cost-efficient solution for your z/OS data-protection needs, particularly on the powerful new z16.

Resources

  • We hope you enjoyed this z/Action! podcast. For more about Model9, visit them on the web.
  • For more on IBM zSystems modernization, visit the IBM Z and Cloud Modernization Center.
  • And be sure to join the ISV Ecosystem User Group on the IBM Z and LinuxONE Community for more updates on how ISVs are innovating the IBM zSystems platform: blogs, events, videos, discussions, and more. Join here.
  • Subscribe to z/Action! Each month we meet some of the world\\u2019s most innovative companies as they share how they're expanding horizons and driving success with IBM zSystems.
'