cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

IBM launches z15 with ability to maintain customer data privacy

Deepa Sharma by Deepa Sharma
September 12, 2019
IBM z15 data privacy

Image Credit: IBM

While moving towards digitization, adopting cloud – data security and privacy is biggest concern among people and business across the globe. Industry’s leader IBM launches latest version of Z mainframe, IBM z15 with objective to advance the ability to maintain customer data privacy on hybrid multi could environments.

IBM z14 was launched in 2017, a single frame model can process more than 8 million encrypted transactions each day. Latest updated version IBM z15 culminates four years of development with over 3,000 IBM Z patents issued or in process and represents a collaboration with input from over100 companies

IBM z15 enterprise platform comes up with following key innovations

1. IBM z15 allows you to manage integrate private, public and hybrid cloud deployments with agility and security.

2. IBM z15 enhances cybersecurity, you can encrypt all your data, isolate workloads and authenticate access, it helps protect data after it leaves the system, minimizing the impact of breaches and noncompliance.

3. An industry-first approach to limiting the cost and impact of planned and unplanned downtime, IBM z15 enabling users to access full system capacity for a period of time to accelerate shutdown and restart of IBM Z services and provide a temporary capacity boost to rapidly recover from lost time.

ADVERTISEMENT

4. IBM z15 combined with the IBM Blockchain Platform delivers a secure, enterprise blockchain solution.

5. IBM z15, a single frame pltform requires 75% less floor space than x86 servers and less than half the floor space of IBM z14.

6. With IBM z15, you can process up to one trillion web transactions per day, support massive databases, and scale-out to 2.4 million Linux containers in a single z15 system.

7. Address mission-critical latency challenges by delivering up to 30 times lower latency and up to 28 times less CPU utilization on z15 by compressing secure web transaction data before encryption using the Integrated Accelerator for z Enterprise Data Compression instead of using software compression.

8. IBM z15 Leverage 12 percent more cores than z14, and 25% more memory than z14 to help meet the needs of today’s digital businesses.

Data Privacy Management, IBM z15 has ability to maintain data privacy by not only protecting data on-premises at the infrastructure level, but allows clients to provision data rules to manage individual user access across private, public and hybrid cloud data at the data level. z15 accomplishes this by delivering

  • Protection for data wherever it goes – Protecting data today is a challenge for the simple reason that data does not stay in one place and solutions are often fragmented or siloed. Data Privacy Passports addresses this challenge by introducing Trusted Data Objects (TDO) which provide data centric protection that stays with the data.
  • Privacy with controlled data usage – Data Privacy Passports allows an organization to establish and enforce an enterprise-wide data privacy policy where different views of data are surfaced to different users based on their need to know. Trusted Data Objects technology can also be used to prevent collusion between data owners leading to the misuse of data.
  • Provable consumption of data – Track the complete data transformation journey from point of origin to point of consumption, with a central point for clients’ auditing and compliance activities from data access to aggregation.
  • Embedded Key Management – Data Privacy Passports provides required key management for Trusted Data Objects that are created and distributed throughout the enterprise. This greatly reduces the complexity of implementing the solutions and provides simple management of data as it moves between systems.

Read More: Ransomware Grows 118% in 2019, McAfee Labs Report Shows Firms Face 504 New Threats per minute

On the Launching of IBM z15- Ross Mauri, GM of IBM Z, said, “IBM Z is an essential component for addressing top concerns around hybrid cloud like security, privacy and agility. With z15, our clients can have the cloud they want, with the privacy and security they need – protection for both traditional mission-critical workloads and newer workloads like digital asset custody or blockchain, The reality is that for clients whose business’ depend on access to data in real time, IBM Z remains the go to choice. Often, our clients need access to data and analytic insights in a fraction of a second – not minutes, with the ability to control privacy of that data at a granular level.”

For more details on IBM z15 and cost

Deepa Sharma

Deepa Sharma

Deepa Sharma is CXOVoice’s Managing Editor, overseeing all coverage technology, cybersecurity, banking, and financial coverage. She can be reached at [email protected]

Related Posts

Ericsson SoftBank
Business

Ericsson Partners with SoftBank to Expand 4G and 5G Network with AI-Driven Solutions

August 1, 2025
Thimaya Subaiya
People

Genpact Appoints Thimaya Subaiya to Board of Directors

August 1, 2025
AI Breaches
AI

The Growing Risks of AI-related Breaches: Insights from IBM’s 2025 Report

July 31, 2025
Palo Alto CyberArk
Cyber Security

Palo Alto Networks to Acquire CyberArk for $25 Billion, Strengthening Identity Security and Cyber Defense

July 31, 2025
Ericsson
Press Release

Ericsson teams with Sunswift Racing to enhance race experience with 5G and satellite Intelligent Bonding

July 31, 2025
Sophos Partner Program
Business

Sophos Launches New Partner Program to Drive Growth and Market Advantage for Partners

July 31, 2025
Visa
Press Release

Visa Brings Google Pay Integration to Fleet Cards, Enabling Tokenization and Push-to-Wallet Across the Digital Wallet Ecosystem

July 30, 2025
LTIMindtree BlueVerse CraftStudio
Technology

LTIMindtree Unveils BlueVerse CraftStudio: Revolutionizing Marketing with AI-Powered Solutions in Partnership with Adobe

July 30, 2025
Load More
ADVERTISEMENT

Latest Updates

Ericsson SoftBank

Ericsson Partners with SoftBank to Expand 4G and 5G Network with AI-Driven Solutions

by News Desk
7 hours ago

Thimaya Subaiya

Genpact Appoints Thimaya Subaiya to Board of Directors

by Deepa Sharma
11 hours ago

AI Breaches

The Growing Risks of AI-related Breaches: Insights from IBM’s 2025 Report

by Deepa Sharma
1 day ago

Palo Alto CyberArk

Palo Alto Networks to Acquire CyberArk for $25 Billion, Strengthening Identity Security and Cyber Defense

by Deepa Sharma
1 day ago

Ericsson

Ericsson teams with Sunswift Racing to enhance race experience with 5G and satellite Intelligent Bonding

by News Desk
1 day ago

Sophos Partner Program

Sophos Launches New Partner Program to Drive Growth and Market Advantage for Partners

by News Desk
1 day ago

Expert Views

Cyber Security

Why Even One Unpatched Device Can Be a Catastrophic Risk for Startups and SMBs

July 25, 2025
Cyber Criminals
Cyber Security

How WormGPT Became ChatGPT’s Evil Twin

July 15, 2025
Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved