Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:developed_by |
gptkb:IBM
|
gptkbp:enables |
secure transactions
secure data sharing |
gptkbp:enhances |
security compliance
|
gptkbp:facilitates |
regulatory compliance
|
https://www.w3.org/2000/01/rdf-schema#label |
IBM z Crypt
|
gptkbp:integrates_with |
gptkb:IBM_Z_systems
|
gptkbp:is_a_key_component_of |
IBM Z security solutions
|
gptkbp:is_available_in |
various deployment models
|
gptkbp:is_available_on |
gptkb:IBM_Z_mainframes
|
gptkbp:is_compatible_with |
gptkb:IBM_Security_Verify
gptkb:IBM_Security_QRadar gptkb:IBM_Security_Guardium various encryption standards |
gptkbp:is_critical_for |
data security
|
gptkbp:is_designed_for |
enterprise applications
mission-critical applications |
gptkbp:is_designed_to |
protect sensitive information
mitigate data breaches |
gptkbp:is_implemented_in |
gptkb:financial_services
|
gptkbp:is_integrated_with |
gptkb:IBM_Security_Access_Manager
gptkb:IBM_Cloud_Pak_for_Security gptkb:IBM_Security_Identity_Governance |
gptkbp:is_optimized_for |
high-performance computing
|
gptkbp:is_part_of |
gptkb:IBM_Z_ecosystem
IBM Z security architecture IBM's hybrid cloud strategy IBM's enterprise security solutions IBM's data protection strategy IBM's security portfolio |
gptkbp:is_supported_by |
IBM's technical support
|
gptkbp:is_used_by |
large enterprises
|
gptkbp:is_used_for |
data loss prevention
regulatory data protection |
gptkbp:is_used_in |
government data protection
mainframe environments |
gptkbp:is_utilized_for |
transaction security
|
gptkbp:is_utilized_in |
healthcare data protection
telecommunications security |
gptkbp:offers |
key management solutions
|
gptkbp:performance |
data processing tasks
|
gptkbp:provides |
data integrity
end-to-end encryption encryption services data-at-rest encryption real-time encryption data encryption at scale |
gptkbp:provides_support_for |
cloud environments
|
gptkbp:regulatory_compliance |
gptkb:GDPR
|
gptkbp:supports |
data protection
multi-cloud strategies data sovereignty data encryption policies |
gptkbp:utilizes |
hardware security modules
|
gptkbp:bfsParent |
gptkb:IBM_System_z
|
gptkbp:bfsLayer |
6
|