Encryption Services for IBM System z

Encryption is a critical component of IT security strategies, and can be especially important for mainframe environments that run mission-critical applications and contain terabytes of sensitive information. Sirius mainframe and security experts help you implement one or more encryption solutions to meet your business objections and address regulatory compliance required in your IT environment. Each function has multiple business values:

Crypto zAssist:

  • Knowledge transfer of basic through advanced topics for strengthening understanding of Crypto features
  • Helps you understand your environment and makes recommendations on where Crypto can be used to enhance your level of security
  • Includes an in-depth review of IBM software and hardware offerings for disk, database, file, network and tape media encryption
  • Includes a discussion on current industry cryptographic certifications for PCI DSS, HIPAA and state requirements

Tape Encryption Implementation:

  • A tape encryption advisory presentation on all options and best practices for enterprise key management, TKLM hosting, and business partner exchange
  • Encryption Architecture document detailing your environment
  • Phased implementation emphasizing skills transfer to your support personnel
  • Real-world practice on key management, key rotation, and diagnostics
  • Follow-on support for DR testing, diagnostics, simple Q&A

DASD Encryption Implementation:

  • IBM DASD encryption advisory presentation on all options and best practices for enterprise key management, TKLM hosting and DR considerations
  • An Encryption Architecture document detailing your environment
  • Phased implementation emphasizing skills transfer to your support personnel
  • Follow-on support for DR testing, diagnostics, simple Q&A

Database Encryption Implementation:

  • Analysis and customization of security environment for user/application access to Crypto processes
  • Creation of Encryption Architecture document detailing your environment as well as procedures for operational key management, master key change and /or recovery
  • Phased implementation emphasizing skills transfer to your support personnel
  • Real-world practice on key management, key change/recovery, and diagnostics
  • Follow-on support for DR testing, diagnostics, simple Q&A
Services Search