Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

cmoullec
on 24 January 2020

How to protect your data, applications, cryptography and OS – 100% of the time


Businesses looking to maximise the security, reliability, efficiency and performance of their essential, mission-critical applications are recognising the mainframe as a robust platform for a variety of workload types.

With Ubuntu on IBM Z and LinuxONE, enhanced security features, pervasive encryption and cryptographic support are leveraged by any workload that must stand up to the most stringent compliance and regulatory standards and certifications.

In this technical discussion, we will provide an introduction to:

* Protecting your operating system
* Ongoing kernel updates, package updates and security patches
* Long term support that facilitates timely upgrade planning and custom solution development to protect the infrastructure investment
* Protecting your cryptography
*Protected key support
*Setup, configuration and usage components for cryptographic operations
* Protecting your data
* Protecting data at rest and data in flight
* Protecting your applications
* Protected application environment with Secure Service Containers

Watch this webinar

Related posts


Canonical
15 January 2026

Canonical Ubuntu and Ubuntu Pro now available on AWS European Sovereign Cloud

Ubuntu Article

Canonical announced it is a launch partner for the AWS European Sovereign Cloud, with Ubuntu and Ubuntu Pro now available. This new independent cloud for Europe enables organizations to run secure, enterprise workloads with full operational autonomy and EU data residency. By combining the performance and expanded security coverage of Ubun ...


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...


ilvipero
9 January 2026

London called, and the world answered: creating a Summit without borders

Ubuntu Article

When we announced that the Ubuntu Summit 25.10 would be a remote event, we knew we were taking a big step. We asked ourselves: how can we capture the spirit of an in-person community event and convey its energy through a screen? How can we connect the circle of friends from all over the world? ...