温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/z/quantum-safe
点击访问原文链接

Quantum Safe - IBM Z

HomeProductsZRead the solution briefIBM Z Crypto Discovery and Inventory (zCDI)Transitioning to quantum-safe cryptography Review potential threats to classical cryptography by way of quantum computers and learn how to make best use of today’s quantum-safe capabilities on the IBM Z platform.Research How a post-quantum approach to cryptography can help protect mainframe dataExplore the IBM RedbookIBM Z Crypto Discovery & InventoryIBM Z Crypto Discovery & InventoryExplore IBM Technology Expert LabsSoftware product IBM Z Crypto Discovery and Inventory (zCDI) IBM Z Crypto Discovery and Inventory (zCDI) is designed to discover, analyze, and manage cryptographic assets across IBM Z environments. By consolidating data from multiple sources, IBM zCDI simplifies compliance, reduces risk and accelerates your journey to quantum-safe cryptography. It plays a critical role in preparing for quantum-safe cryptography by creating a comprehensive cryptographic inventory and identifying vulnerabilitiesFeature of IBM Z hardware CP Assist for Cryptographic Functions (CPACF) As you create your crypto inventory, IBM z16 provides new instrumentation that can be used to track cryptographic instruction execution in the CP Assist for Cryptographic Functions (CPACF). CPACF accelerates the execution of cryptographic operations, such as encryption and decryption, by offloading them from the main processor. This helps improve the speed and efficiency of data security tasks on the system.Software product Application Discovery and Delivery Intelligence (ADDI) ADDI can discover where and how cryptography is used in applications. It enhances quantum-safe readiness by assessing and modernizing applications to support advanced encryption methods. ADDI identifies applications needing updates, analyzes compatibility and maps out risks, helping ensure smooth integration of quantum-safe technologies and strategic modernization. This prepares your systems to effectively handle emerging security challenges.Software product Unified Key Orchestrator (UKO) for IBM z/OS UKO for IBM Z enhances quantum-safe readiness by providing centralized, streamlined key management that supports advanced encryption standards. It simplifies the deployment and management of quantum-safe encryption keys across the IBM Z environment, helping ensure robust and compliant data protection. By facilitating efficient key operations and integration with quantum-safe algorithms, UKO helps organizations transition smoothly to future-proof security measures.Component of IBM z/OS z/OS Encryption Readiness Technology (zERT) A feature in IBM z/OS that enhances quantum-safe readiness by providing tools and features designed to support the transition to quantum-safe encryption standards. It helps ensure that data encryption mechanisms are up-to-date and capable of addressing future quantum threats, facilitating seamless integration of advanced cryptographic solutions into the z/OS environment and helping organizations stay ahead of emerging security challenges.Component of IBM z/OS Integrated Cryptographic Services Facility (ICSF) A software component of IBM z/OS that enhances quantum-safe readiness by providing advanced cryptographic services essential for securing data against emerging quantum threats. It supports quantum-safe algorithms and key management via CEX8S, enabling organizations to transition to new encryption standards seamlessly. ICSF’s robust capabilities help ensure that data protection and encryption practices remain resilient and compliant with evolving security requirements.Software feature IBM Crypto Analytics Tool (CAT) An optionally priced feature that is obtained through a services contract and is part of the IBM UKO that was developed to help provide up-to-date monitoring of crypto-related information on IBM Z in the enterprise. It collects security-relevant information to assist in building your cryptographic inventory and use the graphical client for easy analysis of security information.Explore PCIe Cryptographic CoprocessorRead the solution briefExplore IBM z17

智能索引记录