{"id":34411,"date":"2020-04-14T22:59:00","date_gmt":"2020-04-14T22:59:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/"},"modified":"2020-04-14T22:59:00","modified_gmt":"2020-04-14T22:59:00","slug":"ibm-extends-z15-mainframe-family-intensifies-linux-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/","title":{"rendered":"IBM extends z15 mainframe family, intensifies Linux security"},"content":{"rendered":"<p>IBM continued to reshape the <a href=\"https:\/\/www.networkworld.com\/article\/3446140\/enterprises-find-a-new-use-for-mainframes-blockchain-and-containerized-apps.html\">mainframe<\/a> with an eye toward further integrating it within hybrid clouds and securing <a href=\"https:\/\/www.networkworld.com\/article\/3215226\/what-is-linux-uses-featres-products-operating-systems.html\">Linux<\/a>-based workloads.<\/p>\n<p>On the hardware side, IBM rolled out two entry-level, 19\u201d single-frame, air-cooled platforms, the &nbsp;<a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?infotype=AN&amp;subtype=CA&amp;htmlfid=897\/ENUS120-006&amp;appname=USN\" rel=\"nofollow\">z15 Model T02<\/a> and <a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?infotype=AN&amp;subtype=CA&amp;htmlfid=897\/ENUS120-014&amp;appname=USN\" rel=\"nofollow\">LinuxONE III Model LT2<\/a>. The new machines are extensions of the IBM z15 family that <a href=\"https:\/\/www.networkworld.com\/article\/3438542\/ibm-z15-mainframe-amps-up-cloud-security-features.html\">Big Blue rolled out in September<\/a> of last year.&nbsp;<\/p>\n<p>Both can fit in cloud <a href=\"https:\/\/www.networkworld.com\/article\/3223692\/what-is-a-data-centerhow-its-changed-and-what-you-need-to-know.html\">data-center<\/a> racks and can be outfitted with a second drawer, should customers need to grow capacity.&nbsp; Both feature 65 cores using commercial processors running at 4.5GHz and can be configured to support all manner of workloads.&nbsp;<\/p>\n<aside id=\"fsb-3114\" class=\"fakesidebar fakesidebar-auto\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>IBM said new machines support z\/OS Container Extensions that enable access to an ecosystem of open-source and Linux-on-IBM Z applications that may be deployed within the native z\/OS environment without requiring a separate Linux server, using Docker container skills and patterns. In addition customers can use the latest open-source tools, popular NoSQL databases, analytics frameworks and application servers, IBM said.<\/p>\n<p>The LinuxONE Model LT2 can run a number of Linux systems including <a href=\"https:\/\/www.redhat.com\/en\/blog\/enterprise-linux-all-architectures-bringing-red-hat-enterprise-linux-ibm-z15-and-linuxone-iii-single-frame-systems?sc_cid=701f2000000txokAAA&amp;utm_source=bambu&amp;utm_medium=social&amp;utm_campaign=Partner\" rel=\"nofollow\">Red Hat Enterprise Linux<\/a>, SUSE and Ubuntu, alone or side by side with IBM z\/VM environments on a single physical server. The IBM LinuxONE server can run Linux workloads independently on a single server.<\/p>\n<p>Both systems support IBM\u2019s prepackaged Cloud Paks, which include a secured Kubernetes container and containerized IBM middleware designed to let customers quickly spin-up enterprise-ready containers, the company said. IBM has standard Cloud Paks for data, application, integration, automation and multicloud management and security. The idea is to help customers develop, deploy, and manage cloud-native applications for the z15 family, IBM stated.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>Security and privacy features are key for the z15 and those have been extended with the introduction of IBM Secure Execution for Linux for the all z15 models.&nbsp; In a <a href=\"https:\/\/developer.ibm.com\/blogs\/inside-the-new-ibm-z15-t02-and-linuxone-iii-lt2\/\" rel=\"nofollow\">blog post<\/a> about the security extensions, IBM stated that at its core, a Secure Execution provides a KVM-based virtual machine that is fully isolated and protected from the hypervisor with encryption keys that only the IBM Z hardware and firmware have access to.<\/p>\n<aside id=\"fsb-3065\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\">\n<aside class=\"nativo-promo\">\n<div class=\"excerpt-img bugblog ntv-preview-img-wrapper\" id=\"ntvImageBox\"><img alt=\"ITAAS and Corporate Storage Strategy\" title=\"ITAAS and Corporate Storage Strategy\" data-original=\" https:\/\/images.idgesg.net\/images\/article\/2019\/09\/hpe_nww_post3-100811447-medium.3x2.jpg\" class=\"lazy\" loading=\"lazy\"><\/div>\n<div class=\"excerpt-text\">\n<p class=\"post-meta\"><span class=\"sponsored-blog\">BrandPost<\/span> <span class=\"post-byline\">Sponsored by HPE<\/span><\/p>\n<p class=\"crawl-headline\"><a href=\"https:\/\/www.networkworld.com\/blog\/itaas-and-the-corporate-storage-technology\/?utm_source=IDG&amp;utm_medium=promotions&amp;utm_campaign=HPE22140&amp;utm_content=sidebar\" title=\"ITAAS and Corporate Storage Strategy\" target=\"_blank\" rel=\"noopener noreferrer\">ITAAS and Corporate Storage Strategy<\/a><\/p>\n<p class=\"crawl-summary\">Pay-per-use IT models, such as ITaaS, could be the next chapter in IT infrastructure.<\/p>\n<\/div>\n<\/aside>\n<\/aside>\n<p>\u201cIn practice, an encrypted Linux image is created using the host public key and a customer-specific key. Since the encryption keys are stored on the IBM Z hardware and firmware, the encrypted image can only be executed in a virtual machine on the host(s) it has been prepared for, and the image can\u2019t be decrypted or tampered with outside of the designated host(s). In addition, your unencrypted virtual machine memory cannot be accessed by the host operating system either,\u201d IBM stated. \u201cApplications are then run inside of that virtual machine, allowing the owner of the application to focus on just disk and network data encryption, both of which can be easily handled in userland.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p>In an environment where <a href=\"https:\/\/www.networkworld.com\/article\/3536654\/ibm-taps-new-leaders-for-hybrid-cloud-battles-ahead.html\">customers are running Kubernetes<\/a> across servers running on x86 and Linux on Z systems, you can deploy the Secure Execution containers specifically for the applications you want to have protected, like sensitive databases and blockchain services. In this model, Kubernetes still manages the orchestration of containers, both on x86 and IBM Z, but it has no access to the data inside the Secure Execution environment container, IBM stated.&nbsp;<\/p>\n<p>With Secure Execution IBM is trying to mitigate insider threats to enterprise data.<\/p>\n<p>From 2016 to 2019, the average number of incidents involving employee or contractor negligence has increased from 10.5 to 14.5\u2013and the average number of credential theft incidents per company has tripled over the past three years, from 1.0 to 3.2, According to the <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/LQZ4RONE\" rel=\"nofollow\">Ponemon Institute\u2019s 2020 Cost of an Insider Breach Report<\/a>, IBM stated.&nbsp; \u201cIBM Secure Execution for Linux helps to mitigate these concerns by enabling clients to isolate large numbers of workloads with granularity and at scale, within a trusted execution environment.\u201d<\/p>\n<p>The z15 family already supports what IBM calls <a href=\"https:\/\/developer.ibm.com\/blogs\/data-privacy-passports-for-developers\/\" rel=\"nofollow\">Data Privacy Passports<\/a> that promise to let customers control privacy and security by defining how all data is accessed, stored and shared. The idea is to let customers&nbsp; protect and provision data and revoke access to that data at any time, not only within the z15 environment but across an enterprise&#8217;s hybrid <a href=\"https:\/\/www.networkworld.com\/article\/3429258\/real-world-tools-for-multi-cloud-management.html\">multicloud<\/a> environment, IBM stated.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p>The new systems and software are expected to be available by mid-May.&nbsp;<\/p>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3537678\/ibm-extends-z15-mainframe-family-intensifies-linux-security.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nIBM continued to reshape the mainframe with an eye toward further integrating it within hybrid clouds and securing Linux-based workloads.On the hardware side, IBM rolled out two entry-level, 19\u201d single-frame, air-cooled platforms, the \u00a0z15 Model T02 and LinuxONE III Model LT2. The new machines are extensions of the IBM z15 family that Big Blue rolled out in September of last year.\u00a0To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34412,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1253,493,307],"class_list":["post-34411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-computing","tag-linux","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-14T22:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"IBM extends z15 mainframe family, intensifies Linux security\",\"datePublished\":\"2020-04-14T22:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/\"},\"wordCount\":775,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg\",\"keywords\":[\"cloud computing\",\"Linux\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/\",\"name\":\"IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg\",\"datePublished\":\"2020-04-14T22:59:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibm-extends-z15-mainframe-family-intensifies-linux-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud computing\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IBM extends z15 mainframe family, intensifies Linux security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/","og_locale":"en_US","og_type":"article","og_title":"IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-14T22:59:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"IBM extends z15 mainframe family, intensifies Linux security","datePublished":"2020-04-14T22:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/"},"wordCount":775,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg","keywords":["cloud computing","Linux","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/","url":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/","name":"IBM extends z15 mainframe family, intensifies Linux security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg","datePublished":"2020-04-14T22:59:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/ibm-extends-z15-mainframe-family-intensifies-linux-security.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ibm-extends-z15-mainframe-family-intensifies-linux-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"IBM extends z15 mainframe family, intensifies Linux security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34411"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34411\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34412"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}