Search

1 to 6 of 6
Sort by

Blog Entry
How to have granular and selective secure data at rest and in motion for workloads

Acknowledgement: Thanks to Asmahan Ali , Kumaran Rajaram, & Carl Zetie for their inputs. In an organization there can be different workloads requiring different security posture. As an example, one of the workloads is a high performance computing workload dealing with non-sensitive data...

SANDEEP PATIL's profile image

Blog Entry
Why Storage and HIPAA Compliance for AI & Analytics Workloads for Healthcare

Today, Artificial Intelligence (AI) & Analytics are ubiquitous across industry verticals. Healthcare & Life Science is one such industry where AI and analytics are being used for everything from drug discovery and personalized precision medicine, to predicting hospital walk in patients...

SANDEEP PATIL's profile image


Blog Entry
How to ensure NFS uses strong encryption algorithms for secure data in motion ?

Ensuring data is secure over the wire as well as on the disk is now a days a common norm. IBM Spectrum Scale provides secure data at rest at filesystem level as well as in motion for it's interface protocols. NFS is one such protocol which allows secure data in motion leveraging Kerberos. When...

SANDEEP PATIL's profile image

Blog Entry
Pervasive Encryption with zDMF: Taking steps toward information security's CIA triad

In this article we discuss implementing pervasive encryption using zDMF, and how this effort enhances information security. We first provide a brief overview of information security and its objectives, the so-called CIA triad - Confidentiality, Integrity, Availability. We then look at how...

Archive User's profile image