Securing Adabas & Natural Environments. Becky Albin Chief IT Architect

Size: px
Start display at page:

Download "Securing Adabas & Natural Environments. Becky Albin Chief IT Architect"

Transcription

1 Securing Adabas & Natural Environments Becky Albin Chief IT Architect

2 Find Your Inner Genius at ProcessWorld 2012! Get smarter about using IT to improve business performance Discover inspiring solutions to your pressing business challenges Open your mind to new approaches, new tools and new people Save the Date ProcessWorld 2012 Orlando, Florida October 15-17

3 "Moving Forward with Adabas 8" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Jim Poole (Verizon) Adabas 8 has been a whirlwind of changes where there is a fear that shops have overlooked the incredible range of new features and possibilities. With Adabas 8.2 alone, there were over 40 changes that provide opportunities for DBA and programmers alike. In this fast-paced technical presentation, many of the Adabas 8 changes are explained and how they impact the ways we do business. Enroute, recent benchmark performance studies were done on Adabas caching, changing some long-held paradigms. Those results are presented. Topics include: -Adabas Caching (what, when, why) -Date/Time System Fields -Spanned Records, prevent future risk -Logical removal of fields and descriptors -Improvements to PLOG and WORK -Event Log -A Panoply of other

4 Proposed Customer And SAG Topics for Process World 2012 Customer Presentations With SAG State of Delaware Modernization of Criminal Justice Info System Jody Colhouer of National Business Center - use of Adabas LOBs and EntireX Pam Schwartz of State of Virginia Dept. of Motor Vehicles - use of EntireX George Wolff of NYC DOITT & Nomura, Jim Chambers - Event Replicator Penn State University Data Masking for Adabas Alaska Department of Natural Resources Ada/Nat/BPM customer story Natural ziip Nomura Securities State of Virginia - ApplinX FSCJ Modernization story with ARIS Mashzone Bob Berg of American Family Insurance Adabas SQL Gateway Eric Wood Becky Albin Eric Wood Becky Albin Becky Albin TBD Patrick Gould Eric Wood Bob Jeffcott Tim Ward

5 Proposed Customer And SAG Topics for Process World 2012 Customer Presentations With SAG Travel BA Sys Natural for AJAX, ARIS Mashzone COBOL Modernization Story with ApplinX and/or EXX Adabas and Natural Roadmaps and Future Strategy Guido will follow up TBD SAG HQ

6 Agenda/Topics Securing Adabas ADASCR Adabas Data Encryption Adabas SAF Security RACF or CA-ACF2 or CA-Top Secret Securing Natural Natural Security Natural SAF Security RACF or CA-ACF2 or CA-Top Secret

7 Why Look At Enhancing Security??? Most intrusions are from Internal Employees/Users not hackers Many have not implemented any data security only application security Natural Security ONLY secures Natural New Rules/Regulations/Requirements HIPPA/SOX/BASIL/etc

8 Adabas Security ADASCR ADASCR provides access/update protection: Database File Field Value Access/update permission values ranging from 0 to 14 Stored in Adabas Security File (not external security product) Password must be passed within the application: ADDITIONS 3 of the Adabas Control Block Within the application Inserted via User Exit 1 of the Adabas nucleus

9 Adabas Security ADASCR //DDCARD DD * ADARUN PROGRAM=ADASCR,MODE=MULTI,DATABASE=199,SVC=236 //DDKARTE DD * ADASCR PROTECT FILE=1,ACC=1,UPD=10 * ADASCR INSERT PW=PRODPASS,FILE=1,ACC=1,UPD=1 ADASCR INSERT PW=USERDBA,FILE=1,ACC=14,UPD=14 ADASCR INSERT PW=TESTPASS,FILE=1,ACC=10,UPD=10 * ADASCR SBYVALUE PW=PRODPASS,FILE=1 ADASCR CRITACC='A=DC.',VALACC='A(NEW YORK)' ADASCR CRITUPD='A=DC.',VALUPD='A(NEW YORK)'

10 Adabas Security Encryption Initially set with ADACMP Adabas file level Must provide the encryption key at the time records are stored Key is also needed to read/decrypt Adabas data Encryption key is passed via ADDITIONS4 of the Adabas Control Block Encryption key is not stored don t loose it!!! Only encrypts DATA, not INDEX structures

11 Adabas Security Encryption Initially set with ADACMP ADACMP COMPRESS ADACMP FNDEF='01,AA,7,A,DE,FI' ADACMP FNDEF='01,AB,15,A,DE,MU,NU' ADACMP FNDEF='01,GA' ADACMP FNDEF='02,AC,15,A,NU' ADACMP FNDEF='02,AD,2,P,FI' ADACMP FNDEF='02,AE,5,P,NU' ADACMP FNDEF='02,AF,6,W' ADACMP FNDEF='01,DT,8,P,DT=E(DATETIME),TZ' ADACMP COLDE='7,Y1=AF' ADACMP SUBDE='BB=AA(1,4)' ADACMP SUPDE='CC=AA(1,4),AD(1,1)' ADACMP HYPDE='1,DD,4,A,MU=AB,AC,AD' ADACMP PHONDE='EE(AA)' ADACMP SUBFN='FF=AA(1,2)' ADACMP SUPFN='GG=AA(1,4),AD(1,1)' ADACMP CODE=abcdefgh Field AA Field AB Group GA Field AC Field AD Field AE Field AF Field DT Collation DE Subdescriptor BB Superdescriptor Hyperdescriptor Phonetic Desc Subfield FF Superfield GG Encryption

12 Adabas SAF Security What is SAF? System Authorization Facility z/os standard, accepted by auditors Enables plug in security when implementing RACF or CA-ACF2 or CA-Top Secret Implements mainframe registry users, permissions, system/user defined entities Why not just use ADASCR No tie back to specific user

13 Adabas SAF Security ADASAF Functionality Secure database nucleus, files and commands (RESOURCES) Adabas Utilities Adabas Operator Commands Cross-level checking (where from, Prod/Dev/Test, etc ) Protection of Transaction Data (optional) Adabas Passwords and Cipher Codes

14 Adabas SAF Security ADASAF Functionality Protection of Adabas Online System Protection of Adabas Stored Procedures Adabas Online Systems Remote User Protection Adabas SQL Gateway Protection Adabas Cluster Services and Parallel Services Clips for Natural, EntireX, Entire Net-Work

15 Adabas SAF Security Adabas resources User permissions for Adabas files Access/Update where from in addition to who John is permitted to access file 3 from test systems Test Operator commands restricted DUQ allowed but not STOPU do not check commands such as RC Production

16 Adabas SAF Security Secure resources Utility execution protected user1 may run ADAREP but not ADAINV Operator commands restricted DUQ allowed but not STOPU Remote user control (WCP) Use WCP LINK name Use WCP NODE name Only in conjunction with WAF Initiate a pop-up window on the PC

17 Adabas SAF Security Cipher and passwords ADASCR Cipher codes & Passwords held in RACF (INSTDATA) inserted at the target database no longer need to carry cipher/password on the wire hard-code cipher/password in the application Test Production

18 Adabas SAF Security Customization Parameter module - SAFCFG set global options ABS Adabas Basic Services DDSAF set options specific to an individual nucleus Not all option can be set Overwrite values defined in the parameter module

19 Adabas SAF Security Parameters - example NA2PPRM GWSTYP=1, SECURITY SYSTEM X NWCLASS=ADAXLV, CROSS-LEVEL CLASS X DBCLASS=ADASEC, DATABASE CLASS X DELIM=Y, ENTITY NAME FORMAT X FAILMODE=W, WARNING MODE X GWMSGL=1, TRACE VIOLATIONS X MAXFILES=32, MAX CACHED FILES PER USER X MAXPCC=10, MAX PASSWORDS/CIPHERS X PASSWORD=N, AUTOMATIC PASSWORDS X CIPHER=N, AUTOMATIC CIPHERS X ETDATA=N, ET DATA PROTECTION X ADASCR=N, ADASCR COMPATIBILITY X XLEVEL=2, CROSS-LEVEL CHECKING X GROUP=N, USE GROUP INSTEAD OF USER X DBNCU=10 MAX CACHED DB CHECKS PER USER END

20 Adabas SAF Security On-line administration Natural application SYSAAF Integrated with SYSAOS Features Reset a user or all users Performance information from internal permissions cache Restart AAF inside Adabas reload code (bring in a fix 24*7)

21 Adabas SAF Security Architecture

22 Adabas SAF Security Architecture User Session Administrator Router SAF Gateway Extension Adabas with SAF Extension Adabas with SAF Extension SAF Configuration File RACF CA-ACF2 CA-Top Secret

23 Data Masking for Adabas

24 Close a Gap Provide what s required Hide what s not necessary Provide high quality test data Test Application Data Masking Masked Copy of Production Enhance Use Adabas Tools to create Rules Run-time parameter Data Mapping Production Application Meta-data Production Protect sensitive production data

25 Natural Security

26 Natural Security and SAF Security Controls and checks the access to a Natural environment Protects Natural environment against unauthorized access and improper use Many objects supported: User, User Types, Groups Applications, Libraries Data access (DDM s / Files) Utilities Secures remote development environments (Natural for Windows/NaturalONE) Natural Security Group User Type Libraries Data Access External Security Systems Operating System User Utilities Applications Natural SAF Security RACF, ACF2 TopSecret

27 Natural SAF Facility

28 NSF426 Overview Natural SAF Security based on Natural Security no SAF hooks in Natural or Natural Utilities all is controlled by Natural Security Nucleus NSC Nucleus calls SAF Server or NSC Server dependent if Natural SAF is installed/switched on Natural SAF Security Using central SAF Server Avoid of APF authorization

29 NSF426 Architecture SAF Server External Security System SAF Administration SYSSEC Application NSC Administration NSF Clip Natural NSC Layer NSC Clip Natural Utilities NSC Database (FSEC)

30 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1

31 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1 Resource: Library

32 NSF Features NSC Definitions RACF Definitions Library Profile Environment NSC Group User n NSF RACF Group User n Utility Profile User 2 User 1 Resource Library and Environment

33 Summary NSF Features User authentication User-ID/password check via SAF SAF delivers *GROUP and *USER-NAME NSC determines group profile No user Definitions in NSC Mixed case passwords NSC user maintenance Library Access Logon Check via SAF Only default Library Profile applicably

34 Summary NSF Features Environment Check Environment determined by the system files FNAT, FUSER, FDIC and FSEC Define a profile for each system-file combination Control user access to this profiles ET-ID generation Generates a unique ID for saving Adabas End of Transaction data This may be handled by NSC or NSF There is an alternate algorithm implemented in NSF.

35 Other Security Options EntireX SAF Security (RACF, ACF2, TSS) UNIX local security or LDAP Windows local security of LDAP Entire Net-Work SAF Security (RACF, ACF2, TSS) Adabas SQL Gateway CNXNOPREAUTHORIZE parameter Adabas Online System (AOS) Requires Natural Security

36 Closing slide Thank You!

Software AG TechEd 2015 User Conference

Software AG TechEd 2015 User Conference Software AG TechEd 2015 User Conference Initial Customer Experiences with Event Analytics for Adabas Don Ellis State of MN Becky Albin - Software AG Eric Wood - Software AG 1 Event Analytics for Adabas

More information

Adabas v8.3 Sneak Peek with Adabas v8.2 update. Becky Albin Chief IT Architect

Adabas v8.3 Sneak Peek with Adabas v8.2 update. Becky Albin Chief IT Architect Adabas v8.3 Sneak Peek with Adabas v8.2 update Becky Albin Chief IT Architect Becky.Albin@softwareag.com The information provided in this PPT is entirely subject to change!!! Adabas v8.3 scheduled for

More information

ADVANCED DATABASES CIS 6930 Dr. Markus Schneider. GROUP - 1 Pragna Pasunuri Jithendra Yella Satya Krishna Priyanka Karanam Sankeerth Reddy Mogili

ADVANCED DATABASES CIS 6930 Dr. Markus Schneider. GROUP - 1 Pragna Pasunuri Jithendra Yella Satya Krishna Priyanka Karanam Sankeerth Reddy Mogili ADVANCED DATABASES CIS 6930 Dr. Markus Schneider GROUP - 1 Pragna Pasunuri Jithendra Yella Satya Krishna Priyanka Karanam Sankeerth Reddy Mogili ADABAS CONTENTS FEATURES DATA MODEL DATA STRUCTURES APPLICATION

More information

Security Interface between ADABAS/NATURAL and RACF/ACF2/TOP SECRET Product Overview

Security Interface between ADABAS/NATURAL and RACF/ACF2/TOP SECRET Product Overview Security Interface between ADABAS/NATURAL and RACF/ACF2/TOP SECRET Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail:

More information

Preface... V Table of Figures... XIII

Preface... V Table of Figures... XIII Preface When I presented my experiences with the Event Replicator for Adabas at the International Users Group Conference in Prague, 2010, Software AG and conference attendees inspired and encouraged me

More information

Adabas Concepts of a Database for Mission-Critical Applications

Adabas Concepts of a Database for Mission-Critical Applications Adabas Concepts of a Database for Mission-Critical Applications Friedrich-Schiller-Universität Jena Lehrstuhl für Datenbanken und Informationssysteme Prof. Dr. Klaus Küspert February 1, 2011 Software AG

More information

Experiences with Adabas Migration From to Sacramento, CA. 21 June Dieter W. Storr

Experiences with Adabas Migration From to Sacramento, CA. 21 June Dieter W. Storr Experiences with Adabas Migration From 7.4.4 to 8.1.3 Sacramento, CA 21 June 2010 - Dieter W. Storr June 2010 dstorr@storrconsulting.com 2 June 2010 dstorr@storrconsulting.com 3 Harbor of Monterey, California

More information

SAS/ACCESS 9.3 Interface to ADABAS

SAS/ACCESS 9.3 Interface to ADABAS SAS/ACCESS 9.3 Interface to ADABAS Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS/ACCESS 9.3 Interface to ADABAS: Reference. Cary,

More information

What s new with EntireX Communicator 7.3 Rolf Bahlke crossvision Chief Architect

What s new with EntireX Communicator 7.3 Rolf Bahlke crossvision Chief Architect What s new with EntireX Communicator 7.3 Rolf Bahlke crossvision Chief Architect October 2006 Project Status Next release of EntireX Communicator Version 7.3 Planned release date end of November 2006 z/os

More information

TECHED USER CONFERENCE MAY 3-4, 2016

TECHED USER CONFERENCE MAY 3-4, 2016 TECHED USER CONFERENCE MAY 3-4, 2016 Bruce Beaman, Senior Director Adabas and Natural Product Marketing Software AG Software AG s Future Directions for Adabas and Natural WHAT CUSTOMERS ARE TELLING US

More information

EntireX Highlights of new Features

EntireX Highlights of new Features EntireX 7.3 - Highlights of new Features Crossvision Product Management Software AG EntireX 7.3 Highlights March 2007 Seite 1 EntireX Key Enhancements Key Enhancement areas CentraSite EntireX Workbench

More information

CA Top Secret and CA ACF2 101

CA Top Secret and CA ACF2 101 CA Top Secret and CA ACF2 101 Reg Harbeck CA Wednesday, August 15, 2007 Session 1784 Agenda External Security CA Top Secret (TSS) CA ACF2 (ACF2) How to learn more Q & A 2 Data Security Protection of resources

More information

ConsistADS - Migration System for SAG

ConsistADS - Migration System for SAG ConsistADS - Migration System for SAG Advanced Development Solution (ADS) Basic Concepts ConsistADS is a solution including a set of tools designed for migrating applications written in Natural and Adabas

More information

webmethods Optimize for Infrastructure Guide for Enterprise Transaction Systems

webmethods Optimize for Infrastructure Guide for Enterprise Transaction Systems webmethods Optimize for Infrastructure Version 8.0 June 2009 This document applies to webmethods Optimize for Infrastructure Version 8.0 and to all subsequent releases. Specifications contained herein

More information

Dieter W. Storr. Efficient Usage of Adabas Replication

Dieter W. Storr. Efficient Usage of Adabas Replication Dieter W. Storr Efficient Usage of Adabas Replication Dieter W. Storr Efficient Usage of Adabas Replication A Practical Solution Finder Edited by Stephen Fedtke VIEWEG+ TEUBNER Bibliographie information

More information

Eleven Steps to Make Mainframe Security Audits More Effective and Efficient

Eleven Steps to Make Mainframe Security Audits More Effective and Efficient Eleven Steps to Make Mainframe Security Audits More Effective and Efficient These are some things I ve learned about auditing IBM mainframe computers by trying a lot of approaches, some of which worked

More information

CA Teleview Session Management for z/os r4.4

CA Teleview Session Management for z/os r4.4 PRODUCT SHEET CA Teleview Session Management for z/os CA Teleview Session Management for z/os r4.4 CA Teleview Session Management for z/os (CA Teleview) provides organizations with a powerful, scalable

More information

THINK DIGITAL RETHINK LEGACY

THINK DIGITAL RETHINK LEGACY THINK DIGITAL RETHINK LEGACY Adabas & 2050+ Platform Strategy & Roadmap Bruce Beddoe VP Adabas Systems 1 % BUSINESS & MISSION-CRITICAL 2 For internal use only Billions invested in DIFFERENTIATING business

More information

Vanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria. Presented by Vanguard Integrity Professionals

Vanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria. Presented by Vanguard Integrity Professionals Vanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria Presented by Vanguard Integrity Professionals Legal Notice Copyright 2013 Vanguard Integrity Professionals, Inc.

More information

SAS/ACCESS 9.2. Interface to ADABAS Reference. SAS Documentation

SAS/ACCESS 9.2. Interface to ADABAS Reference. SAS Documentation SAS/ACCESS 9.2 Interface to ADABAS Reference SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2008. SAS/ACCESS 9.2 Interface to ADABAS: Reference.

More information

MANEWS Issue Number 21 the Mainframe Audit News

MANEWS Issue Number 21 the Mainframe Audit News This newsletter tells you stuff you need to know to audit IBM mainframe computers runinng with z/os and the MVS operating system. This issue we show you how to plan the data gathering for your audit. Table

More information

Tutorial: Lessons From A Real Mainframe Break-In Over the Internet

Tutorial: Lessons From A Real Mainframe Break-In Over the Internet Tutorial: Lessons From A Real Mainframe Break-In Over the Internet Stu Henderson 5702 Newington Road Bethesda, MD 20816 (301) 229-7187 STU@STUHENDERSON.COM What You ll Hear Today Brief comments on why

More information

Lets start with the standard disclaimer. Please go to the next slide

Lets start with the standard disclaimer. Please go to the next slide DB2 10 for z/os Security Enhancements James Click Pickel to edit Master text styles IBM Silicon Valley Laboratory DB2 for z/os Second Security level Architect Session: A05 Time: 9 November 2010 11:00 am

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

TRIM. ADABAS/NATURAL Performance Monitor Product Overview

TRIM. ADABAS/NATURAL Performance Monitor Product Overview TRIM ADABAS/NATURAL Performance Monitor Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail: tsi@treehouse.com http://www.treehouse.com

More information

Vanguard Integrity Professionals ez/token

Vanguard Integrity Professionals ez/token RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 18, 2014 Product Information Partner Name Web Site Product Name Version & Platform Product Description Vanguard Integrity

More information

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2

IBM. PDF file of IBM Knowledge Center topics. IBM Operations Analytics for z Systems. Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release 2 IBM Operations Analytics for z Systems IBM PDF file of IBM Knowledge Center topics Version 2 Release

More information

ADABAS File Access Guide

ADABAS File Access Guide ADABAS File Access Guide Release 813 November 2013 IKAN Solutions NV Schaliënhoevedreef 20A B-2800 Mechelen BELGIUM Copyright 2013, IKAN Solutions NV No part of this document may be reproduced or transmitted

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

ACCESS Procedure Reference

ACCESS Procedure Reference 59 CHAPTER 5 ACCESS Procedure Reference Introduction 59 Case Sensitivity in the ACCESS Procedure 60 ACCESS Procedure 60 Description 61 PROC ACCESS Statement Options 62 Options 62 SAS System Passwords for

More information

Top 12 Mainframe Security Exposures and Lessons From A Real Mainframe Break-In

Top 12 Mainframe Security Exposures and Lessons From A Real Mainframe Break-In Top 12 Mainframe Security Exposures and Lessons From A Real Mainframe Break-In Stu Henderson 5702 Newington Road Bethesda, MD 20816 (301) 229-7187 STU@STUHENDERSON.COM What You ll Hear One Person s Experiences

More information

Open Data Analytics for z/os Version 1 Release 1. Solutions Guide IBM SC

Open Data Analytics for z/os Version 1 Release 1. Solutions Guide IBM SC Open Data Analytics for z/os Version 1 Release 1 Solutions Guide IBM SC27-9036-00 Note Before using this information and the product it supports, read the information in Notices on page 107. This edition

More information

Challenges and Issues for RACF Systems

Challenges and Issues for RACF Systems Payment Card Industry (PCI) Challenges and Issues for RACF Systems Jim Yurek Vanguard Integrity Professionals February 28, 2011 Session Number 8507 The Problem: Credit Card Breaches As long as we have

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager Customization Compliance Support Performs specific custom baseline checks Performs

More information

CA Top Secret Security for z/os CA RS 1710 Service List

CA Top Secret Security for z/os CA RS 1710 Service List CA Top Secret Security for z/os 16.0 1 CA RS 1710 List Description Type RO91062 PASSPHRASE VIOLATION IN FAC(STC) CAUSES LOOP WITH OPTIONS(4) PTF RO97371 CICS VERIFY PASSWORD INVALID FACILITY CHECK PTF

More information

Jim McNeill. Vanguard Professional Services VSS10 & VSS13

Jim McNeill. Vanguard Professional Services VSS10 & VSS13 Jim McNeill Vanguard Professional Services VSS10 & VSS13 1 2 Legal Notice Copyright 2017 Copyright by Vanguard Integrity Professionals, Inc. All rights reserved. Unauthorized reproduction, modification,

More information

TECHED USER CONFERENCE MAY 3-4, 2016

TECHED USER CONFERENCE MAY 3-4, 2016 TECHED USER CONFERENCE MAY 3-4, 2016 Bob Jeffcott Software AG Big Data Adabas In Memory Data Management with Terracotta 2016 Software AG. All rights reserved. For internal use only AGENDA 1. ADABAS/NATURAL

More information

How to Get Full Security from Security Software and Tape Management Software Together

How to Get Full Security from Security Software and Tape Management Software Together How to Get Full Security from Security Software and Tape Management Software Together Monday, August 22, 2005 Session 1714 1:30 Stu Henderson (stu@stuhenderson.com) Russell Witt (russell.witt@ca.com) Abstract

More information

SECURITRE. This document is applicable to the SECURITRE Version software package.

SECURITRE. This document is applicable to the SECURITRE Version software package. SECURITRE Reference Manual This document is applicable to the SECURITRE Version 3.3.1 software package. Comments pertaining to this document and the SECURITRE package are encouraged. Please direct all

More information

Installing and Configuring Cisco Unified Real-Time Monitoring Tool

Installing and Configuring Cisco Unified Real-Time Monitoring Tool CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer

More information

Building a Case for Mainframe Security

Building a Case for Mainframe Security Building a Case for Mainframe Security Dr. Paul Rohmeyer, Ph.D. Stevens Institute of Technology Hoboken, New Jersey June 13-15, 2010 1 AGENDA - Problem Statement - Defining Security - Understanding Mainframe

More information

DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW. Version 2, Release October Developed by DISA for the DoD

DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW. Version 2, Release October Developed by DISA for the DoD DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW Version 2, Release 5 28 October 2016 Developed by for the DoD 28 October 2016 Developed by for the DoD Trademark Information Names, products,

More information

Go USA! Get There Faster. 6/29/2010 Process World

Go USA! Get There Faster. 6/29/2010 Process World Go USA! Get There Faster. 6/29/2010 Process World 2010 2 Go Germany! Get There Faster. BPM + BI = Process Intelligence Top 10 Business Priorities Rank Top 10 Technology Priorities Rank Business process

More information

NatQuery The Data Extraction Solution For ADABAS

NatQuery The Data Extraction Solution For ADABAS NatQuery The Data Extraction Solution For ADABAS Overview...2 General Features...2 Integration to Natural / ADABAS...5 NatQuery Modes...6 Administrator Mode...6 FTP Information...6 Environment Configuration

More information

CA Top Secret Security for z/os CA RS 1708 Service List

CA Top Secret Security for z/os CA RS 1708 Service List CA Top Secret Security for z/os 16.0 1 CA RS 1708 List Description Type RO91733 CICS: SUPPORT CICS TS (CTS) REL 5.4 FOR Z/OS PTF RO91735 TSS COMMAND ABEND S0C4 IN TSSKERNL PTF RO94015 CICS: SUPPORT CICS

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

Don't Judge an LDAP Server By Its Name SHARE Orlando

Don't Judge an LDAP Server By Its Name SHARE Orlando Saheem Granados,CISSP (sgranado@us.ibm.com) IBM Software Engineer August 2011 Don't Judge an LDAP Server By Its Name SHARE Orlando August 2011 S9545 2009 IBM Corporation IBM Presentation Template Full

More information

What it means to be a DBA. Best Practices

What it means to be a DBA. Best Practices What it means to be a DBA Best Practices Natural Conference in Boston, MA August 17-20, 2008 dstorr@storrconsulting.com DBA? Doing Business As Deutsche Ba (German airline) Doctor of Business Administration

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

ADABAS & NATURAL 2050+

ADABAS & NATURAL 2050+ ADABAS & NATURAL 2050+ Guido Falkenberg SVP Global Customer Innovation DIGITAL TRANSFORMATION #WITHOUTCOMPROMISE 2017 Software AG. All rights reserved. ADABAS & NATURAL 2050+ GLOBAL INITIATIVE INNOVATION

More information

Electronic Transfer System Electronic Transfer System (ETS) Client Accounts Manual

Electronic Transfer System Electronic Transfer System (ETS) Client Accounts Manual (ETS) Client Accounts Manual October 2006 1 ETS ACCOUNT... 2 1.1 ETS ACCOUNT (SITE ADMINISTRATOR ACCOUNT)... 2 1.2 CLIENT ACCOUNTS... 2 2 SECURE ETS WEB SITE... 3 2.1 MAIN WEB SITE... 3 2.2 LOGGING ON...

More information

Introduction to CICS. Course introduction

Introduction to CICS. Course introduction Introduction to CICS Course introduction Course introduction What is CICS? What is an application server? Why use an application server? Course introduction Services provided by CICS How CICS applications

More information

Auditing and Protecting your z/os environment

Auditing and Protecting your z/os environment Auditing and Protecting your z/os environment Guardium for IMS with IMS Encryption Roy Panting Guardium for System z Technical Sales Engineer March 17, 2015 * IMS Technical Symposium 2015 Agenda Audit

More information

All About Caches and Buffers

All About Caches and Buffers ADABAS All About Caches and s Natural Conference in Boston, PA August 17-20, 2008 dstorr@storrconsulting.com General ASSO DATA C A C H E ADABAS Pool (LBP) ADACSH Hiperspace Dataspace WORK Online SVC /

More information

Express Setup. System Requirements. Express Setup CHAPTER

Express Setup. System Requirements. Express Setup CHAPTER 3 CHAPTER You access the switch module via the host CGR 2010 router. For more information, see Accessing the Switch Module, page 4-2. To exchange and monitor control messages between the switch module

More information

Data encryption & security. An overview

Data encryption & security. An overview Data encryption & security An overview Agenda Make sure the data cannot be accessed without permission Physical security Network security Data security Give (some) people (some) access for some time Authentication

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

IBM Tivoli Access Manager for e-business V6.1.1 Implementation

IBM Tivoli Access Manager for e-business V6.1.1 Implementation 000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must

More information

Using the Cisco Unified Analysis Manager Tools

Using the Cisco Unified Analysis Manager Tools CHAPTER 17 The Unified Analysis Manager provides a set of tools that allow you to perform management tasks for specific devices and groups of devices. The following sections describe the tasks you can

More information

BUILDING BRIDGES. SMART DCI plugs your legal application into the new world. ADABAS/Natural

BUILDING BRIDGES. SMART DCI plugs your legal application into the new world. ADABAS/Natural BUILDING BRIDGES SMART DCI plugs your legal application into the new world /Natural page 2 of 12 Whitepaper SmartDCI Contents 1. The SmartDCI Product Range.............................................................

More information

Security zsecure Visual Version Client Manual SC

Security zsecure Visual Version Client Manual SC Security zsecure Visual Version 2.1.0 Client Manual SC27-5647-00 Security zsecure Visual Version 2.1.0 Client Manual SC27-5647-00 Note Before using this information and the product it supports, read the

More information

Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment

Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment Musewerx provides Application Maintenance Services for your applications written in NATURAL and ADABAS environment.

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

Hints and Tips for Using webmethods EntireX v7.3 About the Author Introduction webmethods EntireX

Hints and Tips for Using webmethods EntireX v7.3 About the Author Introduction webmethods EntireX April 2008 Hints and Tips for Using webmethods EntireX v7.3 By Neil Beesley, Founding Member and Enterprise Software Specialist, Commutual Technical Consulting, LLC About the Author Neil Beesley has spent

More information

How to use VPN L2TP over IPsec

How to use VPN L2TP over IPsec How to use VPN L2TP over IPsec Server/Client on TW-EAV510 AC Note: 1. Please make sure that both LAN side networks are in different subnet. 2. Just some OS support L2TP Tunnel authentication, like Android

More information

John Hilman. Vanguard Professional Services BAS08

John Hilman. Vanguard Professional Services BAS08 John Hilman Vanguard Professional Services BAS08 1 2 Legal Notice Copyright 2017 Copyright by Vanguard Integrity Professionals, Inc. All rights reserved. Unauthorized reproduction, modification, publication,

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

Oracle WebLogic Server 12c: Administration I

Oracle WebLogic Server 12c: Administration I Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

WRE6505 v2. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 10/2016

WRE6505 v2. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 10/2016 WRE6505 v2 Wireless AC750 Range Extender Version 1.00 Edition 1, 10/2016 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup http://dhcp-assigned IP www.zyxel.comhttp://192.168.1.2

More information

Overview Guide. Mainframe Connect 15.0

Overview Guide. Mainframe Connect 15.0 Overview Guide Mainframe Connect 15.0 DOCUMENT ID: DC37572-01-1500-01 LAST REVISED: August 2007 Copyright 1991-2007 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and

More information

BACKUP APP V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE

BACKUP APP V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE V7 MICROSOFT EXCHANGE DATABASE BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 15 July 2016 First Draft New 3 February 2017 Added instructions and screen shots for Encryption

More information

EntireX 8.2 New Features - Highlights -

EntireX 8.2 New Features - Highlights - EntireX 8.2 New Features - Highlights - Juergen Lind Sr. Product Manager / May 2011 Software AG provides no commitment to deliver any of the features described herein, and reserves the right to change

More information

What's Missing in Mainframe InfoSec: (What We Don't Know We Don't Know)"

What's Missing in Mainframe InfoSec: (What We Don't Know We Don't Know) What's Missing in Mainframe InfoSec: (What We Don't Know We Don't Know)" Stu Henderson stu@stuhenderson.com 5702 Newington Road www.stuhenderson.com Bethesda, MD 20816 (301) 229-7187 ABSTRACT 2 In this

More information

Presented by Jim McNeill Vanguard Professional Services

Presented by Jim McNeill Vanguard Professional Services Presented by Jim McNeill Vanguard Professional Services 2016 Vanguard Integrity Professionals, Inc. 1 Legal Notice Copyright 2016 Vanguard Integrity Professionals, Inc. All Rights Reserved. You have a

More information

N2O. Administrator Manual

N2O. Administrator Manual N2O Administrator Manual Note: All references to the N2O version in this manual are indicated by vrs or v.r.s. The current release of N2O is version 5.3.1. This document is applicable to N2O and N2O/3GL

More information

Security and Authentication

Security and Authentication Security and Authentication Authentication and Security A major problem with computer communication Trust Who is sending you those bits What they allow to do in your system 2 Authentication In distributed

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Rocket Software Strong Authentication Expert

Rocket Software Strong Authentication Expert RSA SecurID Ready Implementation Guide Last Modified: May 5, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description Rocket Software www.rocketsoftware.com

More information

The Old is New Again Engineering Security in the Age of Data Access from Anywhere

The Old is New Again Engineering Security in the Age of Data Access from Anywhere The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

CA ACF CA RS 1705 Service List

CA ACF CA RS 1705 Service List CA ACF2 16.0 1 CA RS 1705 List Description Type RO92798 LDS SSL INIT FAILS W/CAS2386W PTF RO93394 ACF89001 VSAM I/O ERROR WITH SHARED DASD AND CACHE PTF RO93615 ABEND S0E0 IN SAFOEUSP ON A INIT_USP CALL

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

WF-2402 Quick Installation Guide

WF-2402 Quick Installation Guide WF-2402 Quick Installation Guide Netis 150Mbps Wireless-N Broadband Router 1. Check Your Package Contents The following items should be found in your package: 150Mbps Wireless-N Broadband Router Power

More information

Digipass Plug-In for SBR. SBR Plug-In SBR. Steel-Belted RADIUS. Installation G uide

Digipass Plug-In for SBR. SBR Plug-In SBR. Steel-Belted RADIUS. Installation G uide Digipass Plug-In for SBR SBR Plug-In SBR Steel-Belted RADIUS Installation G uide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Installing and Configuring Cisco Unified Real-Time Monitoring Tool

Installing and Configuring Cisco Unified Real-Time Monitoring Tool CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer

More information

USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com

USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD bxterra.com TABLE OF CONTENTS INTRODUCTION... INSTALLATION... SNMP MANAGER GUI... SNMP MANAGER FUNCTIONS MENU... SETTINGS... ONLINE UPGRADE... SYSTEM MANAGER...

More information

SIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1

SIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1 Preface Connecting SCALANCE S615 to the WAN 1 SIMATIC NET VPN tunnel between SCALANCE S615 and 2 SINEMA RC Server Industrial Ethernet Security Getting Started 07/2017 C79000-G8976-C390-02 Legal information

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

SAS/ACCESS Interface to R/3

SAS/ACCESS Interface to R/3 9.1 SAS/ACCESS Interface to R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to R/3: User s Guide. Cary, NC: SAS Institute

More information

Improving the performance of webinitiated CICS transaction workloads

Improving the performance of webinitiated CICS transaction workloads Improving the performance of webinitiated CICS transaction workloads Patrick Fournier Serge Bourlot John Bachiochi (SysperTec) Tuesday, August 13, 2013 (12:15 to 1:15 PM) Session # 13456 Presenters Bio

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A15 Title : Engineering a Citrix Virtualization Solution Vendors : Citrix

More information

IBM Data Virtualization Manager for z/os Version 1 Release 1. Installation and Customization Guide IBM GC

IBM Data Virtualization Manager for z/os Version 1 Release 1. Installation and Customization Guide IBM GC IBM Data Virtualization Manager for z/os Version 1 Release 1 Installation and Customization Guide IBM GC27-8874-00 Note Before using this information and the product it supports, read the information in

More information