温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/how-to-make-mainframes-quantum-safe-and-secure
点击访问原文链接

How to Make Mainframes Quantum-Safe and Secure?

How to Make Mainframes Quantum-Safe and Secure? About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers November 18, 2022 How to Make Mainframes Quantum-Safe and Secure? Written by: Jussi Rautio Mainframe admins know very well that all data communications should be well-secured. You have likely already converted your unsecure FTP traffic into SFTP with SSH Tectia Server for IBM z/OS, or maybe you are considering your options at this point. But now there’s talk about the quantum threat - that quantum computers are going to compromise all current data communications in a few years' time. You start to wonder: how will this impact me and my system? Let’s find out.

Due to their exceptional processing power and reliability, mainframes are a cornerstone of data processing architectures in many large organizations. Having a very robust internal security architecture, they are still vulnerable to unprotected or weakly protected data communications. At the same time, quantum computers are getting more powerful, threatening the security of all modern data infrastructures. The following developments affect specifically mainframes:

1. Zero Trust mandates Zero Trust is a popular paradigm that states that you should always verify all access to targets and encrypt all data communications, even in internal networks. Mainframes are no exception. On the contrary, they present a valuable target that should be given the maximum level of protection. The U.S. Federal Government has mandated that all agencies migrate to Zero Trust as soon as possible. 
 
As a mainframe administrator, your critical systems should be ahead of the rest of the organization when it comes to securing your data communications systems against the quantum threat. 

2. Recording attacks Mainframes process data that is critical for the organization. This data often contains secrets that are valid and potent for a long time, like personal health information or credit card numbers. While data is comfortably safe when in the mainframe storage, it can be easily intercepted from data communications.  
 
With the eventual availability of large-scale quantum computers, the encryption protecting the data can be cracked, leaving the valuable secrets contained within exposed. This means that the quantum threat is already present, for mainframes as well as other systems. 

3. Terminal connection vulnerability The mainframe is as secure as its least secure data connection. The default TN3270 terminal connection towards a mainframe is unprotected and therefore vulnerable to a session hijack. Such connections should be either disabled or secured, for example, using the tunneling feature of Tectia Server for IBM z/OS. With tunneling, the terminal connection becomes quantum-safe as well!

4. Hardware acceleration  A mainframe administrator needs to be aware of the costs of CPU processing power and consider solutions that include offloading external cryptographic coprocessors like CEX or zIIP. 

Securing mainframe communications Securing your mainframe against the quantum threat does not require huge infrastructure investments, and you don’t need dedicated fiber cables.

Tectia Server for IBM z/OS is the only solution on the market with a straightforward FTP-SFTP conversion that does not need massive script rewriting. When coupled with SSH Tectia Quantum-Safe Client/Server or a compatible third-party client/server on the other end, all communications in and out of the mainframe will be quantum-safe.

Learn more in our Guide to Secure Data Communications for IMB z/OS Mainframe by clicking the link below.

 

Tag(s): quantum-safe , Post-Quantum Cryptography , mainframe security Jussi Rautio Jussi's mission at SSH is to develop the product vision for the company's flagship product, Tectia. He has been in the IT business for more than 20 years, researching, developing, and managing products.

Other posts you might be interested in Privileged Access Management 6 min read | February 17, 2026 Zero-Day Cyberattack on Major Telcos in Singapore: Lessons on Securing Privileged Access to Critical Systems  Read More Privileged Access Management 6 min read | February 9, 2026 How to break up with your password Read More Privileged Access Management 7 min read | February 3, 2026 SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity  Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录