Published on 11 Jul 2014
“ With DB2 for z/OS at the heart of our new real-time banking capabilities, we can offer better quality of service and facilities to our customers. ”
Mike Pighills, Head of IT Services, Nationwide
Nationwide is the world’s largest building society, and is one of the UK’s top three savings and mortgage providers. Its ambition is to be just as strong in the banking market, with a stated aim of achieving a 10 percent share of the UK market for primary personal checking accounts.
Customer demand for always-on, multi-channel banking threatened to derail Nationwide’s growth objectives. How could the bank create and support attractive new accounts faster than the competition?
A radical, five-year transformation from legacy core systems to a modern, real-time, multi-channel banking system. At its heart, IBM® DB2® for z/OS® provides unbeatable security, resilience and flexibility.
24/7 availability to support anytime, anywhere banking services. Shorter time-to-market for new accounts. Provides ample scalability to support Nationwide’s ambitious growth plans.
IBM products and services that were used in this case study.
DB2 Query Monitor for z/OS, DB2 for z/OS, IBM Security zSecure Suite, InfoSphere Guardium Activity Monitor, z/OS
System z: zEnterprise 196 (z196), System z, System z: System z running z/OS, Power 595, Power Systems
IBM-SAP Alliance, GBS ISV Community: SAP, IBM Global Business Services, IBM Global Services
DB2 for z/OS, InfoSphere Guardium Activity Monitor, FSS: Banking - Back Office - Core Systems Transformation, FSS: Banking - Front Office - Multi-Channel Transformation, Enabling Business Flexibility, High Availability, Mobile, System z Software, Virtualization, Virtualization - Server
© Copyright IBM Corporation 2014. IBM Corporation, Software Group, Route 100, Somers, NY 10589. Produced in the United States. July 2014. IBM, the IBM logo, ibm.com, DB2, Global Business Services, Guardium, InfoSphere, Parallel Sysplex, Power, Power Systems, zEnterprise, zSecure, and z/OS are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. SAP for Banking is not an IBM product or offering. SAP for Banking is sold or licensed, as the case may be, to users under SAP’s terms and conditions, which are provided with the product or offering. Availability, and any and all warranties, services and support for SAP for Banking is the direct responsibility of, and is provided directly to users by, SAP. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.