Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

IBM’s Massive z13 Mainframe Encrypts, Analyzes Transactions in Real-time

IBM z13 Photo

IBM on Tuesday took the covers off its z13 mainframe, what it says is one of the most sophisticated computer systems ever built, and designed to deliver massive scalability together with real-time encryption and analytics to help support the demands of the mobile economy.

IBM z13 Photo

IBM on Tuesday took the covers off its z13 mainframe, what it says is one of the most sophisticated computer systems ever built, and designed to deliver massive scalability together with real-time encryption and analytics to help support the demands of the mobile economy.

With $1 billion invested and five years of development behind the z13, the system is able to process 2.5 billion persistent, protected and auditable transactions a day.

According to the technology giant, its powerful z13 offers scalable real-time encryption technologies that enable a higher level of security for mobile initiated transactions.

Furthermore, embedded analytics provide real-time insights on all transactions and help clients run real-time fraud detection on 100 percent of their transactions to detect fraud fraudulent transactions as they occur.

As use the of mobile devices increases, businesses and consumers are driving exponentially larger numbers of mobile transactions.

“Each of these mobile transactions triggers a cascade of events across computing systems,” IBM explained. “These events include comparisons to past purchases, data encryption and decryption, bank-to-bank reconciliations, and customer loyalty discounts. This cascade of events causes a so-called “starburst effect” – where a single transaction can trigger as few as four or as many as 100 additional system interactions.”

As a result, the starburst effect can create security vulnerabilities at each interaction point.

“Every time a consumer makes a purchase or hits refresh on a smart phone, it can create a cascade of events on the back end of the computing environment. The z13 is designed to handle billions of transactions for the mobile economy,” said Tom Rosamilia, senior vice president, IBM Systems. “Consumers expect fast, easy and secure mobile transactions. The implication for business is the creation of a secure, high performance infrastructure with sophisticated analytics.”  

Advertisement. Scroll to continue reading.

Fully supporting Linux and OpenStack, the z13 can power private or hybrid cloud architectures and is capable of running up to 8,000 virtual servers — more than 50 virtual servers per core.

In addition to fraud prevention, businesses can use the powerful capabilities of the z13 to give customers a personalized experience by gaining real-time insights into their purchasing habits to offer up-sell and cross-sell promotions before they leave an online store.

Pricing for the z13 was not provided by IBM.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...