Introducing IBM Hyper Protect Data Controller
The sensitive, personally identifiable information (PII) you hold (customer names, address, title, and so on) already might be secured with encryption on a trusted system of record, such as the IBM Z. That data, or typically many copies of that data, often must be moved or shared within the organization or outside of the enterprise’s data boundary for different purposes.
Each landing place for that data can feature differing privacy requirements, ability to protect the data, and capability to report ...
Get Getting Started with IBM Hyper Protect Data Controller now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.