|System z on Facebook
A Sweltering Summer Day -- Cooled with Crypto
Caroline Exum 270004MPQK firstname.lastname@example.org | | 9,172 Visits
By Maura Schoonmaker, System z Security Offering Manager
Ever sit around on a sweltering summer day in your yard with your feet in a tiny blow up pool wishing you and your family had a nice large in-ground pool without having to invest the money to install one in your yard? Then just your luck - they build a pool in your neighborhood and because you are part of the neighborhood you get a free membership for your family to be able to use the pool without having to spend any money to install one in your own yard!
So now I bet you are thinking…what does this analogy have to do with hardware cryptography? Think about how your family is now able to have a free membership to the neighborhood pool without investing in one..well now, just like the enterprise pool, the System z Cryptographic Hardware can be utilized across the enterprise for all of your cryptographic transactions with the release of the Enterprise Key Management Pillar-Advanced Crypto Analytics Provider (EKMP-ACSP). This client/server solution enables the distributed platforms to use cryptographic hardware on System z…just like your family is part of the neighborhood (think of it as an enterprise) and can utilize the neighborhood pool and get the benefits of a nice swim without having to invest in their own pool. EKMP-ACSP allows the distributed platforms to utilize the cryptographic hardware on System z resulting in a cost effective usage of the already available crypto.
Now go back to the pool analogy…as the manager of the neighborhood pool you will want to know about all of your members and their issues just like you want to know about all about cryptographic information in your enterprise. Luckily the Enterprise Key Management Pillar-Crypto Analytics Tool (EKMP-CAT) is now available. CAT collects all kinds of crypto information and performs correlations and analysis that is presented to the user in a comprehensive fashion as an overview of the crypto system. For the pool manager who wants reports on members with violations or usage of the pool, the CAT allows a user to have control over which applications are using which cryptographic function and where there are weak keys or potential security violations.
I know at this point you are probably excited about these new offerings and the benefits they can provide in your shop – the access to remote cryptographic hardware & the utilization of cryptographic capacity as well as the ability to have organized reports at your finger tips…but wait there is more! If you pair these solutions with the already available Enterprise Key Management Foundation (EKMF) offering, you will now be able to manage all of your keys across your entire enterprise and get comprehensive reports of your cryptographic information in one report! This alone is a huge bonus because you will be able to have a single point of control and management for all of your key management operations across your enterprise while being able to provide a view of your cryptographic system for your auditors.
Now while you are sitting back relaxing by your neighborhood pool enjoying a cool drink you can clear your mind knowing that your entire cryptographic enterprise now has a single point of control for key management as well as up to date reports on all cryptographic capabilities! Cheers!
To read more about our System z Security Solutions please visit: http://www.ibm.com/systems/z/solutions/security.html
Maura Schoonmaker is the System z Security Offering Manager working out of Poughkeepsie, NY. She is responsible for creating and bringing the System z Security Solutions to market world wide. She also engages in Business Development for System z platform. Mrs. Schoonmaker is also the SHARE IBM Liaison partnering IBM and the leading mainframe User Group WW. Previously, Mrs. Schoonmaker was the manager of the System z Software Program Management team driving the team to deliver all of the System z SW & HW releases. Prior to that she managed the System z Security Development Team. Maura joined IBM in 2000 in Poughkeepsie, NY as a System z Security Tester and during her career has held a number of positions across the System z platform including managing, developing, testing and doing business development on the platform.