This website uses cookies

Cookies are small text files that can be used by websites to make a user's experience more secure and to analyze traffic to the site. We use cookies for the following purposes:

- Necessary: Cookies are required to access secure areas of the website and to provide important platform notifications. The site cannot function properly without these cookies
- Statistics: Cookies are used to track device information anonymously to better understand how visitors interact with the website.

This notice applies to the following domains:

Top 5 Encryption Myths for IBM i Users

Tue, Jul 17, 2018 12:01 PM CDT{LOCAL_TZ}

Top 5 Encryption Myths for IBM i Users

Content by Syncsort

Tue, Jul 17, 2018 12:01 PM CDT

Do you know encryption fact from fiction?

With data breaches frequently making the headlines, businesses are losing more business 

and personally identifiable information than ever. Every industry and company is at risk - public 
and private. Encryption is one of the best ways to protect this information, but misperceptions 
related to cost, performance, and ease of use run rampant. 

Join Syncsort and Patrick Townsend, Founder & CEO of Townsend Security, to set the record straight
on the top 5 encryption myths for IBM i users.

Featured Speakers:

Patrick Townsend
Founder and CEO
Townsend Security

Becky Hjellming
Product Marketing Director

Back to Event Center

By registering, you agree to IBM Systems Media Privacy Policy:
close log in form button
Log In Now Not Registered?

close register form button
  • z/OS
  • z/VM (Linux on z Systems)
  • z/VM (Not hosting Linux on z)
  • Other z Systems OS
  • IBM i
  • AIX
  • Linux on Power
  • Agree