An account you cover has received media attention. A disgruntled administrator had root access to a Linux x86 financial server, altered the boot process, and deactivated all of the security measures. The result was that highly sensitive data was stolen.
The account security director would like to meet with you to determine if IBM Z has a solution that would prevent this from happening again.
Which IBM Z solution will prevent this type of breach?