Connect with us

Hi, what are you looking for?


Cloud Security

IBM Launches z15 Mainframe With New Data Protection Capabilities

IBM z15 mainframe

IBM on Thursday unveiled the IBM z15, a mainframe that provides enterprises new capabilities for protecting sensitive customer data across hybrid multi-cloud environments.

IBM z15 mainframe

IBM on Thursday unveiled the IBM z15, a mainframe that provides enterprises new capabilities for protecting sensitive customer data across hybrid multi-cloud environments.

The z15 can process up to one trillion web transactions per day, it supports massive databases, it has 12 percent more cores and 25 percent more memory than its predecessor, and it delivers 30 times lower latency, IBM says.

As for security, the z15 introduces new technology called Data Privacy Passports, which provides end-to-end data protection and privacy, allowing users to encrypt data and grant or revoke access to it, regardless of where it moves.

This technology can allow organizations to enforce data privacy policies that are adapted to the needs of different users, and track data anywhere it travels.

The Data Privacy Passports technology is currently in beta and it’s available not only on z15 platforms, but also on LinuxONE III Linux server hardware, which IBM also announced on Thursday and which incorporates other technologies as well from the z15.

IBM says these capabilities, which the company claims are an industry first, enable organizations to give their customers more control over how their personal data is used. This, according to a study published by the tech giant on Thursday, is exactly what consumers want — a survey showed that 76 percent would be more willing to share personal data with an entity that allows them to take back that data at any time.

“IBM Z is an essential component for addressing top concerns around hybrid cloud like security, privacy and agility. With z15, our clients can have the cloud they want, with the privacy and security they need – protection for both traditional mission-critical workloads and newer workloads like digital asset custody or blockchain,” said Ross Mauri, GM of IBM Z.

Mauri added, “The reality is that for clients whose businesses depend on access to data in real time, IBM Z remains the go to choice. Often, our clients need access to data and analytic insights in a fraction of a second – not minutes, with the ability to control privacy of that data at a granular level.”

Advertisement. Scroll to continue reading.

IBM also unveiled on Thursday the DS8900F enterprise storage system, which is designed to provide comprehensive cybersecurity, data availability and resiliency for mission-critical hybrid multi-cloud environments.

Related: IBM Launches Hardened z13s Mainframe for Hybrid Clouds

Related: New IBM Z Mainframe Designed to “Pervasively Encrypt” Enterprise Data

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to and Exchange Online.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...


Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.