zsecure New features and functions

Size: px
Start display at page:

Download "zsecure New features and functions"

Transcription

1 zsecure New features and functions Rob van Hoboken zsecure architect IBM Corporation

2 Disclaimer 2 IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.

3 zsecure Products New releases for z/os products 5655-N25 IBM Security zsecure Compliance and Administration N23 IBM Security zsecure Administration N16 IBM Security zsecure Admin N20 IBM Security zsecure Visual N24 IBM Security zsecure Compliance and Auditing N17 IBM Security zsecure Audit N21 IBM Security zsecure Alert N19 IBM Security zsecure Command Verifier N18 IBM Security zsecure CICS Toolkit AD8 IBM Security zsecure Adapters for QRadar SIEM z/vm offering 5655-T13 IBM Security zsecure Manager for RACF z/vm 3

4 zsecure Products zsecure level >= z/os level zsecure 2.1 and zsecure 1.13 and Support z/os 1.10, 1.11, 1.12 and 1.13 zsecure Support z/os 1.12, 1.13 and 2.1 End of support September 30, 2015

5 Agenda zsecure Alert zsecure Audit 5 Compliance framework New data for automating controls Intelligent fields for SMF records DB2 zsecure Admin Customizable alerts Digital Certificate support Access Monitor QRadar

6 zsecure Alert Customizable alerts specify critical resource users that are allowed to access them Application specific alerts 6

7 New Customization options SE.A.P and SE.A.S New options P and S on SE.A After selecting PCI/Sensitive select which data set All Alert configuration members are from same library Use C2PCUST if you want alerts for separate set of resources or users, for example also alerts for Compliant and/or Authorized users 7

8 Customization members PCI-DSS related alerts (SE.A.P): Members CLASSIFY, PCIPAN, PCIPANCL, PCIAUTH Used for alerts: 1209, 1210, 1211 Sensitive resource related alerts (SE.A.S): Members SENSRSRC, SENSMEMB, SENSREAD, SENSUPDT, SENSAPFU Used for alerts: {1212,1213}, 1214, 1212, 1213, and

9 Customization members (Classify/SensRsrc) Use SIMULATE CLASS with PCI-AUTH, PCI-PAN, PCI-PAN-clr! 9 Or with Site-Dsn-R, Site-Dsn-U PCI/Site sensitivity only used when resource does not yet have sensitivity. Cannot override existing sensitivity, e.g. RACF back STC proclib Success auditing must be active for the resource!

10 Customization members (Authorized Users/Groups) 10 List of users and groups that can access certain resources without alert Separate members SENSREAD SENSUPDT, SENSAPFU

11 zsecure Audit Compliance Framework New data sources DB2 Integration to Guardium 11

12 Older zsecure versions drawbacks with compliance testing Builtin standards (C1 / C2 / B1) were inflexible Need to adapt more quickly to external standard updates Audit concern principle misses the positive confirmation that it is OK Audit concerns not customizable (exceptions / mitigating controls) Customers created ad-hoc reporting, partly 2-pass queries Need something less ad-hoc and easier to customize Need something that works almost out of the box Need to combine information from many report types Need to customize / define who is considered authorized Scope of external standards is increasing Need to collect more settings from more subsystems. 12

13 More flexibility please! The zsecure Compliance Testing Framework Support newer external standards DISA STIG for z/os RACF DISA STIG for z/os ACF2 PCI DSS IBM outsourcing GSD331/iSec Eliminate need for 2-pass queries * STIG: Security Technical Implementation Guide; Guidelines from US Defense Information Systems Agency (DISA) ** GSD331: IBM's primary information security controls documentation for Strategic Outsourcing customers * PCI DSS: Payment Card Industry Data Security Standard for retail payments Show positive compliance, not just non-compliance Summaries showing progress in compliance efforts Support in-standard customization Members with authorized (compliant) IDs (using STIG naming) Allow rule override (suppression) with reason visible in reporting Allow creation and seamless integration of site standards Extend data collection CICS, IMS, DB2, MQ, IP, FTP, TELNET, some UNIX 13

14 Compliance reporting Simple user interface Available in menu option AU.R - run all available STIG rules/tests - run all available GSD331 rules/tests - run all available PCI-DSS rules/tests - run individual rule Choose results to include in report (none=all) 14

15 Compliance reporting Sample output RACF Priority Work! RULE_SET names and percentage compliant state 15

16 Compliance reporting Sample output ACF2 Percentage compliant 16

17 Compliance reporting Zoom in to test level Test names contain clear test numbers 17

18 Compliance reporting Zoom in to detail level 18

19 Compliance reporting detail level Scroll down to see 19

20 PCI-DSS rule set example 20

21 Populate PCI-DSS definitions Data set with members to populate New members for PCI-DSS: 21 CLASSIFY Sensitive data sets PCIAUTH Users authorized for Authentication data PCIPAN Users authorized for Primary Account Numbers PCIPANCL Users authorized for Cleartext Primary Account Numbers

22 Build your own STANDARD simplest structure STANDARD mystandard VER(version) DOMAIN mydomain SELECT(type) RULE myrule DOMAIN(mydomain) TEST mytest type(field=value) ENDRULE ENDSTANDARD 22

23 Sample RACF STIG multi-test rule member For instance member CKAGR244 for rule RACF0244: DOMAIN FACILITY_class, SELECT(class(class=FACILITY)) RULE RACF0244 domain(facility_class), DESC("FACILITY resource class is inactive") TEST facility_active class(active=yes), DESCRIPTION("FACILTY class is active") TEST facility_generic class(generic=yes), DESCRIPTION("Generic is active") TEST facility_gencmd class(gencmd=yes), DESCRIPTION("GENCMD is enabled for FACILITY class") TEST facility_racl class(raclist=yes), DESCRIPTION("FACILITY class is RACLISTed") ENDRULE 23

24 Simple example - ACF2 STIG rule ACF0760 Member C2AGA760 for rule ACF0760 DOMAIN LID_SECURITY, SELECT(ACF2_LID(Security=yes)) RULE ACF0760 DOMAIN(LID_SECURITY), DESC( All LOGONIDs with the SECURITY attribute have the RULEVLD and RSRCVLD attributes specified") TEST Rulevld_Specified ACF2_LID(Rulevld=yes), DESC("All logonids with Security attribute have RULEVLD specified") TEST Rsrcvld_Specified ACF2_LID(Rsrcvld=yes), DESC("All logonids with Security attribute have RSRCVLD specified") ENDRULE 24

25 New Data for Automating controls Needed to test for rules or rule applicability 25

26 RE new options N and Q (Network / Message Queue) 26

27 New RE.N option VTAM Application nodes - selection No authentication 27

28 New RE.N option for VTAM Major APPL nodes 28

29 New RE.N option for VTAM Minor APPL nodes Partner verification 29

30 RE.N - TYPE=VTAMAPPL Access list display 30 Detail display (Access Lists) ACF2_ACL and ACF2_RULE_ENTRY also supported/shown

31 New MQ_* newlist types with in total > 200 fields 31 MQ_REGION MQ_CHANNEL MQ_CONNECT MQ_INIT MQ_NAMELIST MQ_PROCESS MQ_QUEUE MQ_TOPIC 62 fields 21 fields 22 fields 12 fields 23 fields 24 fields 31 fields 24 fields

32 RE.Q.R - MQ region overview display 32

33 RE.Q.R - MQ Region details Empty for non-qsg region Startup Parameter module Use MQ/MX classes: Uppercase profiles 33

34 New TYPE=AS Show Address Space attributes Not yet in standard UI, only used in compliance controls Recognize subsystems needed for controls 34

35 New TYPE=AS_DD Show Address Space DDnames Not yet in standard UI, only used in compliance controls. Find parameter file 35

36 New TYPE=UNIX_PS UNIX Process Status UNIX process program names and program arguments Not yet in standard UI, only used in compliance controls 36

37 TYPE=SENSDSN new fields easing security analysis Sensitive data set ACL, RACF profiles and ACF2 rule entries RACF_CLASS, RACF_PROFILE, RACF_UACC, RACF_IDSTAR_ACCESS, RACF_WARN_ONLY, RACF_AUDITF, RACF_AUDITS SAF_VOLSER 37 VOLSER filled for VSAM with data component volume Not yet in standard UI, only used in compliance controls

38 TYPE=RESOURCE sensitivity knowledge base New repeat group added to show risks per access level PRIV_PRIO, PRIV_SENSTYPE, PRIV_CONCERN, PRIV_CONDITION, PRIV_ACCESS Not yet in standard UI, only used in compliance controls Extra values for general resource sensitivity (previously resource ) Enables easy selectivity from compliance controls Currently around 150 values (11 characters) ActParmTSO, AddSiteCert, AddSiteCrt2, AddUserCert, AddUserCrt2, AllowAll, AltSiteCert, AltSiteCrt2, AltUserCert, AltUserCrt2, AnyDirUpd, AnyFileRead, AnyFileUpd, AnyTapeRdWr... CSVDYNL, DaemonACEE, DaemonSuid, Dflt ID map, DittoFullpk, DmsFiles, DssCopyAny, DssDumpAny... TestAuthTSO, ThreadACEE, TrustedDisk, TrustedFile, TrustedHome, UnscopedSec, UNIXdebugAP 38

39 AU.S RACF RESOURCE SENSITIVE TRUST 39

40 TYPE=SMF enhancements New fields SENSTYPE Sensitivity of data set USER_GROUP connects of the USER field in current security DB PRIV_USER_GROUP subset of USER_GROUP PRIVILEGES character summary of userid privileges 40 defined by SIMULATE PRIV_USER_GROUP important to installation RACF: special operations auditor grpspec grpoper grpaudit superuser ACF2: Acc (ACCOUNT) "Mnt MAINT "ncn" (NONCNCL) "Sec SECURITY STC (STC) RECORD_DECOMPRESSED Compressed CICS records are now processed New field enables error diagnosis by inspecting decompressed image Processing of compressed CICS records is transparent

41 DB2 reporting Automated collection of security parameters from running DB2 zsecure : Minimal region and classes support zsecure : Regions, Tables, Packages and Plans Limited ACL support (ACL NORMAL) zsecure 2.1.0: Databases, Tablespaces, Stored procedures, User functions, JARs, Storage groups, Sequences Full ACL support (ACL EXPLODE / RESOLVE / EFFECTIVE) zsecure 2.1.1: Buffer pools, Collections, Variables, Schemas, User data types 41

42 DB2_ACL internal authority display formats Can be set using ACL primary command Or using format specification in CARLa ACL ORIGIN NOORIGIN toggles individual GRANT lines versus one line per grantee where date and grantor show most recent change. Only applies to NORMAL mode of DB2_ACL Has no effect on other ACLs 42

43 DB2 Reporting RACF_DB2_ACL Shows access in RACF, in combination with DB2 internal security Exit uses SAF resources: Object-Specific resources (allow / deny / undecided) Database-Specific resources (ACL RESOLVE or EFFECTIVE) - allow Region-Specific resources (ACL RESOLVE or EFFECTIVE) - allow If no access and no Object-Specific profile, fallback to DB2 internal security (ACL EFFECTIVE) RACF_DB2_ACL also incorporates Different rules for user-tables versus non-user-tables Effect of SEPARATE_SECURITY Owning authid for DB2 objects (for certain object types) RACF profile OWNER CLAUTH in resource class 43

44 DB2 Reporting RACF_DB2_ACL Multiple formats supported. Can be set using ACL command NORMAL EXPLODE RESOLVE EFFECTIVE TRUST Standard format. Groups are exploded into connected user Ids. Default activation of SCOPE. Show one merged line per RACF user ID. Include effect of warning mode, UACC, ID(*). Include database and system authorizations. Include information about fallback to DB2 Internal security. Include DB2 Owner of object of applicable. Include information about administrative scope (separate output line). Also options to include All users in UNIVERSAL groups. Object within admin SCOPE over any contributing profile. 44

45 DB2 resources and DB2 ACL example 45

46 Guardium Vulnerability Assessment integration zsecure Audit job loads DB2 with CKADBVA tables Date and time of zsecure extract for each DB2 region User, Group and Connect information Pass RACF_DB2_ACL for all supported object types, in 2 forms: ACL NORMAL ACL EFFECTIVE (access control matrix) Guardium VA inside Guardium appliance picks up tables if new information applies policy creates exception and entitlement reports 46

47 47

48 zsecure Admin Digital Certificate management Access Monitor 48

49 Digital certificate management zsecure support New Digital Certificate interface Using standard zsecure interface: select-display-action Selection panel with main options Also options to directly create new objects Action via line commands and overtyping Options for follow-on commands (workflow) Most parameters verified before execution Last specified parameters are retained for easy correction Use of templates to specify values (site / user) Allow forcing value or just default Commands can be routed using zsecure server Contrary to RRSF 49

50 Digital certificate management the RA.5 menu New main certificate menu RA.5 Work with items use selection interface for existing profiles Other items allow adding/importing/creating new objects 50

51 New template setup menu SE.9 Use F column to force the value entered 51

52 Digital certificate management Line commands Issue / line command to get popup with list 52

53 Access Monitor enhancements RACINIT reporting support New intercept routine (ICHRIX02), installed automatically. New fields in newlist type=access New newlist type=racf_access_id Counts are based on RACINIT events Dates are based on any recorded event STATUS=ACCESS request bit added (explains ALTER access) New field SIM_VIA_GROUPS List of all connect groups that would allow access New SIMULATE SETROPTS CLASSACT GENERIC GENCMD RACLIST 53

54 New options on AM AM.V for reporting about recorded events AM.I for reporting usage of IDs in RACF database 54

55 AM.V selection on new flags 55

56 Access Monitor SIM_VIA and SIM_VIA_GROUPS 56

57 IBM Security zsecure helps address mainframe security challenges Vulnerability analysis for the mainframe infrastructure. Automatically analyze and report on security events & detect security exposures Combined audit and administration for RACF in the VM environment including auditing Linux on System z Collects, formats and sends enriched mainframe System Management Facility (SMF) audit records to IBM Security QRadar SIEM Enables more efficient and effective RACF administration, using significantly fewer resources Real-time mainframe threat monitoring permits you to monitor intruders and identify misconfigurations that could hamper your compliance efforts Helps reduce the need for scarce, RACF-trained expertise through a Microsoft Windows based GUI for RACF administration Policy enforcement solution that helps enforce compliance to company and regulatory policies by preventing erroneous commands Provides access RACF command & APIs from a CICS environment, allowing additional administrative flexibility * Supports RACF, CA ACF2 and CA Top Secret ** Supports RACFand CA ACF2 ACF2 and Top Secret are either registered trademarks or trademarks of CA, Inc. or one of its subsidiaries. 57

58 Security Monitoring - zsecure integration with QRadar SIEM Event sources from System z... z/os 58 RACF CA ACF2 CA Top Secret CICS DB2

59 Use QRadar to monitor security events from System z zsecure integration with QRadar can be used to monitor user behaviour - verify if users are complying with policy and standards 59 Event data collected by zsecure Audit

60 Using QRadar to monitor those privileged users on your mainframe Highly sensitive resource keys to the kingdom! 60 Could be used to circumvent system security

61 QRadar Drilling into events collected from the mainframe Drill down 61

62 Security is a process Monitor, analyze audit records and create compliance reports Collect information, assess, and establish security policy Security Security Intelligence Intelligence Automatically and continuously enforce security policy Automate corrective actions by updating access controls IBM Security zsecure Compliance and Admin 62

63 Security is a process, zsecure is the toolbox zsecure Audit: compliance reports zsecure Audit: automated vulnerability finder QRadar SIEM Security Security Intelligence Intelligence zsecure Audit reports zsecure Alert zsecure Admin: Access Monitor RACF Offline zsecure Command Verifier IBM Security zsecure Compliance and Admin 63

64 zsecure Products New releases for z/os products 5655-N16 IBM Security zsecure Admin N20 IBM Security zsecure Visual N17 IBM Security zsecure Audit N21 IBM Security zsecure Alert N19 IBM Security zsecure Command Verifier N18 IBM Security zsecure CICS Toolkit AD8 IBM Security zsecure Adapters for QRadar SIEM z/vm offering 5655-T13 IBM Security zsecure Manager for RACF z/vm zsecure solution sets 5655-N25 IBM Security zsecure Compliance and Administration N24 IBM Security zsecure Compliance and Auditing N23 IBM Security zsecure Administration

65 IBM Security zsecure Suite knowledge center 65

66 Questions 66 66

67 Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. ibm.com/security 67 Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Configuring zsecure To Send Data to QRadar

Configuring zsecure To Send Data to QRadar Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:

More information

Fabrizio Patriarca. Come creare valore dalla GDPR

Fabrizio Patriarca. Come creare valore dalla GDPR Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data

More information

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation MSS VSOC Portal Single Sign-On Using IBM id Changes to VSOC Portal Sign In Page Users can continue to use the existing Client Sign In on the left and enter their existing Portal username and password.

More information

The Myth of Mainframe Security

The Myth of Mainframe Security The Myth of Mainframe Security Glinda Cummings IBM Sr. Security Product Manager glinda@us.ibm.com Session: 16144 The mainframe is the most SECURABLE environment 2 Agenda Where did it all start? Aren t

More information

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring

More information

ISAM Advanced Access Control

ISAM Advanced Access Control ISAM Advanced Access Control CONFIGURING TIME-BASED ONE TIME PASSWORD Nicholas J. Hasten ISAM L2 Support Tuesday, November 1, 2016 One Time Password OTP is a password that is valid for only one login session

More information

IBM MaaS360 Kiosk Mode Settings

IBM MaaS360 Kiosk Mode Settings IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017 Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung

More information

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the

More information

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support. ISAM Federation STANDARDS AND MAPPINGS Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support July 19, 2017 Agenda ISAM Federation Introduction Standards and Protocols Attribute Sources

More information

REST APIs on z/os. How to use z/os Connect RESTful APIs with Modern Cloud Native Applications. Bill Keller

REST APIs on z/os. How to use z/os Connect RESTful APIs with Modern Cloud Native Applications. Bill Keller REST APIs on z/os How to use z/os Connect RESTful APIs with Modern Cloud Native Applications Bill Keller bill.keller@us.ibm.com Important Disclaimer IBM s statements regarding its plans, directions and

More information

Is Your z/os System Secure?

Is Your z/os System Secure? Ray Overby Key Resources, Inc. Info@kr-inc.com (312) KRI-0007 A complete z/os audit will: Evaluate your z/os system Identify vulnerabilities Generate exploits if necessary Require installation remediation

More information

A Pragmatic Path to Compliance. Jaffa Law

A Pragmatic Path to Compliance. Jaffa Law A Pragmatic Path to Compliance Jaffa Law jaffalaw@hk1.ibm.com Introduction & Agenda What are the typical regulatory & corporate governance requirements? What do they imply in terms of adjusting the organization's

More information

Innovate 2013 Automated Mobile Testing

Innovate 2013 Automated Mobile Testing Innovate 2013 Automated Mobile Testing Marc van Lint IBM Netherlands 2013 IBM Corporation Please note the following IBM s statements regarding its plans, directions, and intent are subject to change or

More information

Deploying CICS regions with the z/os Provisioning Toolkit

Deploying CICS regions with the z/os Provisioning Toolkit Deploying CICS regions with the z/os Provisioning Toolkit Dan Millwood - https://www.linkedin.com/in/dan-millwood-32373042/ IBM UK Ltd November 2018 Session GL Important Disclaimer IBM s statements regarding

More information

Security Update PCI Compliance

Security Update PCI Compliance Security Update PCI Compliance (Payment Card Industry) Jeff Uehling IBM i Security Development uehling@us.ibm.com 2012 IBM Corporation PCI Requirements An Information only Presentation NOTE: These Slides

More information

How to Secure Your Cloud with...a Cloud?

How to Secure Your Cloud with...a Cloud? A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud

More information

# All Security All The Time: System z Security Update for CA ACF2, IBM RACF, CA Top Secret

# All Security All The Time: System z Security Update for CA ACF2, IBM RACF, CA Top Secret #12264 All Security All The Time: System z Security Update for CA ACF2, IBM RACF, CA Top Secret February 4, 2013 ~ 3:00pm Mark Hahn Carla A. Flores Session Evaluations QR codes Online for up to 72 hours

More information

Performing a z/os Vulnerability Assessment. Part 2 - Data Analysis. Presented by Vanguard Integrity Professionals

Performing a z/os Vulnerability Assessment. Part 2 - Data Analysis. Presented by Vanguard Integrity Professionals Performing a z/os Vulnerability Assessment Part 2 - Data Analysis Presented by Vanguard Integrity Professionals Legal Notice Copyright 2014 Vanguard Integrity Professionals - Nevada. All Rights Reserved.

More information

IBM Security zsecure IBM MFA for z/os

IBM Security zsecure IBM MFA for z/os IBM Security zsecure IBM MFA for z/os Rob van Hoboken zsecure Architect - Rob.vanHoboken@nl.ibm.com Mike Zagorski WW Offering Manager Zagorski@us.ibm.com IBM November 2018 Session FK Protecting Data at

More information

Security zsecure Audit for ACF2 Version Getting Started IBM GI

Security zsecure Audit for ACF2 Version Getting Started IBM GI Security zsecure Audit for ACF2 Version 2.2.0 Getting Started IBM GI13-2325-02 Security zsecure Audit for ACF2 Version 2.2.0 Getting Started IBM GI13-2325-02 Note Before using this information and the

More information

Ponemon Institute s 2018 Cost of a Data Breach Study

Ponemon Institute s 2018 Cost of a Data Breach Study Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell

More information

IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux

IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux August/September 2015 Please Note IBM s statements regarding its plans, directions, and intent are subject

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

IBM i 7.3 Features for SAP clients A sortiment of enhancements

IBM i 7.3 Features for SAP clients A sortiment of enhancements IBM i 7.3 Features for SAP clients A sortiment of enhancements Scott Forstie DB2 for i Business Architect Eric Kass SAP on IBM i Database Driver and Kernel Engineer Agenda Independent ASP Vary on improvements

More information

IBM Next Generation Intrusion Prevention System

IBM Next Generation Intrusion Prevention System IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,

More information

PROFESSIONAL SERVICES (Solution Brief)

PROFESSIONAL SERVICES (Solution Brief) (Solution Brief) The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard

More information

Security zsecure Alert Version User Reference Manual IBM SC

Security zsecure Alert Version User Reference Manual IBM SC Security zsecure Alert Version 2.2.1 User Reference Manual IBM SC27-5642-03 Security zsecure Alert Version 2.2.1 User Reference Manual IBM SC27-5642-03 Note Before using this information and the product

More information

IBM Application Performance Analyzer for z/os Version IBM Corporation

IBM Application Performance Analyzer for z/os Version IBM Corporation IBM Application Performance Analyzer for z/os Version 11 IBM Application Performance Analyzer for z/os Agenda Introduction to Application Performance Analyzer for z/os A tour of Application Performance

More information

IBM Threat Protection System: XGS - QRadar Integration

IBM Threat Protection System: XGS - QRadar Integration IBM Security Network Protection Support Open Mic - Wednesday, 25 May 2016 IBM Threat Protection System: XGS - QRadar Integration Panelists Tanmay Shah - Presenter Level 2 Support Product Lead Danitza Villaran-Rokovich,

More information

zsecure Alert Version User Reference Manual IBM SC

zsecure Alert Version User Reference Manual IBM SC zsecure Alert Version 2.3.0 User Reference Manual IBM SC27-5642-04 zsecure Alert Version 2.3.0 User Reference Manual IBM SC27-5642-04 Note Before using this information and the product it supports, read

More information

Integrated, Intelligence driven Cyber Threat Hunting

Integrated, Intelligence driven Cyber Threat Hunting Integrated, Intelligence driven Cyber Threat Hunting THREAT INVESTIGATION AND RESPONSE PLATFORM Zsolt Kocsis IBM Security Technical Executive, CEE zsolt.kocsis@hu.ibm.com 6th Nov 2018 Build an integrated

More information

XGS & QRadar Integration

XGS & QRadar Integration IBM Security Support Open Mic - January 28, 2015 XGS & QRadar Integration Advanced Threat Protection Integration Options Panelists Wes Davis Advanced Threat Support Group Engineer (Presenter) Thomas Gray

More information

IBM United States Software Announcement , dated February 17, 2015

IBM United States Software Announcement , dated February 17, 2015 IBM United States Software Announcement 215-031, dated February 17, 2015 The IBM CICS Transaction Gateway V9.2 open beta offering enables continuous integration testing for JSON web services and all remote

More information

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

IBM Security Network Protection Open Mic - Thursday, 31 March 2016 IBM Security Network Protection Open Mic - Thursday, 31 March 2016 Application Control and IP Reputation on the XGS Demystified Panelists Tanmay Shah, Presenter IPS/Network Protection Product Lead Bill

More information

IBM MQ Update BITUG BigSIG Gerry Reilly Development Director and CTO IBM Messaging and IoT Foundation IBM Hursley Lab, UK

IBM MQ Update BITUG BigSIG Gerry Reilly Development Director and CTO IBM Messaging and IoT Foundation IBM Hursley Lab, UK IBM MQ Update BITUG BigSIG 2014 Gerry Reilly Development Director and CTO IBM Messaging and IoT Foundation IBM Hursley Lab, UK Please Note IBM s statements regarding its plans, directions, and intent are

More information

A Day In the Life demo One example using COBOL/CICS

A Day In the Life demo One example using COBOL/CICS A Day In the Life demo One example using COBOL/CICS David Hawreluk EM Specialist IBM New York dhawrel@us.ibm.com Regi Barosa Executive IT Specialist IBM Boston rbarosa@us.ibm.com January, 22 2013 IBM s

More information

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard

More information

DB2 S-TAP, IMS S-TAP, VSAM S-TAP

DB2 S-TAP, IMS S-TAP, VSAM S-TAP IBM InfoSphere Guardium Version 8.2 IBM InfoSphere Guardium 8.2 offers the most complete database protection solution for reducing risk, simplifying compliance and lowering audit cost. Version 8.2 contains

More information

Disk Space Management of ISAM Appliance

Disk Space Management of ISAM Appliance IBM Security Access Manager Tuesday, 5/3/16 Disk Space Management of ISAM Appliance Panelists David Shen Level 2 Support Engineer Steve Hughes Level 2 Support Engineer Nicholas Hasten Level 2 Support Engineer

More information

Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator

Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator Maryela Weihrauch, IBM Distinguished Engineer, WW Analytics on System z March, 2017 Please note IBM s statements regarding

More information

Latest from the Lab: What's New Machine Learning Sam Buhler - Machine Learning Product/Offering Manager

Latest from the Lab: What's New Machine Learning Sam Buhler - Machine Learning Product/Offering Manager Latest from the Lab: What's New Machine Learning Sam Buhler - Machine Learning Product/Offering Manager Please Note IBM s statements regarding its plans, directions, and intent are subject to change or

More information

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

DB2 REST API and z/os Connect SQL/Stored Procedures Play a Role in Mobile and API Economics

DB2 REST API and z/os Connect SQL/Stored Procedures Play a Role in Mobile and API Economics DB2 REST API and z/os Connect SQL/Stored Procedures Play a Role in Mobile and API Economics Maryela Weihrauch IBM Distinguished Engineer z Systems Analytics WW Technical Sales and Client Champion Please

More information

IBM Security zsecure. Documentation updates: 64-bit Service Stream Enhancement IBM

IBM Security zsecure. Documentation updates: 64-bit Service Stream Enhancement IBM IBM Security zsecure Documentation updates: 64-bit Service Stream Enhancement IBM IBM Security zsecure Documentation updates: 64-bit Service Stream Enhancement IBM ii IBM Security zsecure: Documentation

More information

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services Vanguard is the industry leader in z/os Mainframe Software to

More information

Be effective in protecting against the cybercrime

Be effective in protecting against the cybercrime Be effective in protecting against the cybercrime INTEGRATED SECURITY FOR A NEW ERA Domenico Raguseo Domenico Scardicchio Luca Bizzotto Simone Riccetti Technical Sales Manager, Europe Software Procdut

More information

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

WHITE PAPERS. INSURANCE INDUSTRY (White Paper) (White Paper) Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services Vanguard is the industry leader in z/os Mainframe Software to ensure enterprise compliance

More information

Db2 for z/os Early experiences using Transparent Data Set Encryption

Db2 for z/os Early experiences using Transparent Data Set Encryption Db2 for z/os Early experiences using Transparent Data Set Encryption Support for z/os Data Set Encryption Jim Pickel (pickel@us.ibm.com) Db2 for z/os Development Disclaimer IBM s statements regarding its

More information

XGS: Making use of Logs and Captures

XGS: Making use of Logs and Captures IBM Security Network Protection XGS Open Mic webcast #6 June 24, 2015 XGS: Making use of Logs and Captures Panelists Bill Klauke (Presenter) Product Lead L2 Support Maxime Turlot Product Lead L2 Support

More information

Optimize Your Heterogeneous SOA Infrastructure

Optimize Your Heterogeneous SOA Infrastructure Optimize Your Heterogeneous SOA Infrastructure SHARE Boston 2010 Walter Falk IBM, Executive Director Cloud Business Development wfalk@us.ibm.com The world is getting smarter more instrumented, interconnected,

More information

Security Support Open Mic Build Your Own POC Setup

Security Support Open Mic Build Your Own POC Setup IBM Security Access Manager 08/25/2015 Security Support Open Mic Build Your Own POC Setup Panelists Reagan Knowles Level II Engineer Nick Lloyd Level II Support Engineer Kathy Hansen Level II Support Manager

More information

Tenable.io for Thycotic

Tenable.io for Thycotic How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com.

More information

May the (IBM) X-Force Be With You

May the (IBM) X-Force Be With You Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security

More information

DB2 for z/os Tools Overview & Strategy

DB2 for z/os Tools Overview & Strategy Information Management for System z DB2 for z/os Tools Overview & Strategy Haakon Roberts DE, DB2 for z/os & Tools Development haakon@us.ibm.com 1 Disclaimer Information regarding potential future products

More information

IBM Security Network Protection Solutions

IBM Security Network Protection Solutions Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf V1.1 TPF Users Group - Spring 2009 Security Considerations in a Service Oriented Architecture (SOA) Jason Keenaghan Main Tent AIM Enterprise Platform Software IBM z/transaction Processing Facility

More information

CICS V5.4 open beta and beyond

CICS V5.4 open beta and beyond CICS V5.4 open beta and beyond Alexander David Brown IBM UK Ltd. Date of presentation (01/10/2016) Session GB Preface IBM s statements regarding its plans, directions and intent are subject to change or

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

End to End Analysis on System z IBM Transaction Analysis Workbench for z/os. James Martin IBM Tools Product SME August 10, 2015

End to End Analysis on System z IBM Transaction Analysis Workbench for z/os. James Martin IBM Tools Product SME August 10, 2015 End to End Analysis on System z IBM Transaction Analysis Workbench for z/os James Martin IBM Tools Product SME August 10, 2015 Please note IBM s statements regarding its plans, directions, and intent are

More information

Insurance Industry - PCI DSS

Insurance Industry - PCI DSS Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services. Vanguard is the industry leader in z/os Mainframe Software to ensure enterprise compliance with the

More information

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2

More information

Predators are lurking in the Dark Web - is your network vulnerable?

Predators are lurking in the Dark Web - is your network vulnerable? Predators are lurking in the Dark Web - is your network vulnerable? Venkatesh Sadayappan (Venky) Security Portfolio Marketing Leader IBM Security - Central & Eastern Europe Venky.iss@cz.ibm.com @IBMSecurityCEE

More information

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza Giulia Caliari IT Architect, IBM Security #IBMSecurity Attackers break through conventional

More information

Performing a z/os Vulnerability Assessment. Part 3 - Remediation. Presented by Vanguard Integrity Professionals

Performing a z/os Vulnerability Assessment. Part 3 - Remediation. Presented by Vanguard Integrity Professionals Performing a z/os Vulnerability Assessment Part 3 - Remediation Presented by Vanguard Integrity Professionals Legal Notice Copyright 2014 Vanguard Integrity Professionals - Nevada. All Rights Reserved.

More information

Partitions. Make Administration on the Cloud more organized. Rajesh (Raj) Patil Girish Padmanabhan Rashmi Singh

Partitions. Make Administration on the Cloud more organized. Rajesh (Raj) Patil Girish Padmanabhan Rashmi Singh Partitions Make Administration on the Cloud more organized. Rajesh (Raj) Patil Girish Padmanabhan Rashmi Singh Please note IBM s statements regarding its plans, directions, and intent are subject to change

More information

How Vanguard Solves. Your PCI DSS Challenges. Title. Sub-title. Peter Roberts Sr. Consultant 5/27/2016 1

How Vanguard Solves. Your PCI DSS Challenges. Title. Sub-title. Peter Roberts Sr. Consultant 5/27/2016 1 How Vanguard Solves Title Your PCI DSS Challenges Sub-title Peter Roberts Sr. Consultant 5/27/2016 1 AGENDA 1. About Vanguard/Introductions 2. What is PCI DSS 3. PCI DSS 3.1/3.2 Important Dates 4. PCI

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

The McGill University Health Centre (MUHC)

The McGill University Health Centre (MUHC) The McGill University Health Centre (MUHC) Strengthening its security posture with in- depth global intelligence Overview The need MUHC security staff wanted to more quickly identify and assess potential

More information

IBM services and technology solutions for supporting GDPR program

IBM services and technology solutions for supporting GDPR program IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment

More information

TPF Users Group Code Coverage in TPF Toolkit

TPF Users Group Code Coverage in TPF Toolkit z/tpf V1.1-2011 Code Coverage in TPF Toolkit Mohammed Ajmal Development Tools Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference

More information

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services Vanguard is the industry leader in z/os Mainframe Software to

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Aligning with HIPAA mandates in healthcare

Aligning with HIPAA mandates in healthcare How IBM can help you develop a successful plan designed to meet security and privacy requirements Let s get started 3 Introduction 4 Aligning with other security frameworks 5 How IBM can help build and

More information

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] s@lm@n IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] Question No : 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product?

More information

BigFix 101- Server Pricing

BigFix 101- Server Pricing BigFix 101- Server Pricing Licensing in a Nutshell BigFix is included with AIX Enterprise Edition (AIX EE). If you have AIX EE on a system, all the cores on that system are covered and any LPAR running

More information

20 years of Lotus Notes and a look into the next 20 years Lotusphere Comes To You

20 years of Lotus Notes and a look into the next 20 years Lotusphere Comes To You 20 years of Lotus Notes and a look into the next 20 years Lotusphere Comes To You Kevin Cavanaugh, Vice President, Messaging and Collaboration Lotus Software and WebSphere Portal email@us.ibm.com Organizations

More information

Junction SSL Debugging With Wireshark

Junction SSL Debugging With Wireshark Junction SSL Debugging With Wireshark IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option.

More information

Where Copybooks Go and Rational Developer for System z and Rational Team Concert Implementation Questions

Where Copybooks Go and Rational Developer for System z and Rational Team Concert Implementation Questions Where Copybooks Go and Rational Developer for System z and Rational Team Concert Implementation Questions Venkat Balabhadrapatruni venkatu@us.ibm.com August 6th, 2014 Session: 15474 Insert Custom Session

More information

CA IT Client Manager / CA Unicenter Desktop and Server Management

CA IT Client Manager / CA Unicenter Desktop and Server Management CA GREEN BOOKS CA IT Client Manager / CA Unicenter Desktop and Server Management Object Level Security Best Practices LEGAL NOTICE This publication is based on current information and resource allocations

More information

IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply IBM Corporation

IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply IBM Corporation IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply Agenda - Overview of Fast Apply - When to use Fast Apply - The available strategies & when to use - Common concepts - How to configure

More information

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights IBM PowerSC Designed for Enterprise Security & Compliance in Cloud and Virtualised environments Highlights Simplify management and measurement for security & compliance Quickly view security compliance

More information

Security Support Open Mic: ISNP High Availability and Bypass

Security Support Open Mic: ISNP High Availability and Bypass Panelists Ed Leisure Knowledge Engineer, Presenter Andrew Sallaway SWAT Consultant Kenji Hamahata L2 Engineer (Japan) Maxime Turlot Product Lead Arthur Testa Product Lead Jeff Dicostanzo Advanced Value

More information

Lisa Banks Distributed Systems Subcommittee

Lisa Banks Distributed Systems Subcommittee z/tpf V1.1 Title: Concepts of z/tpf SOAP Consumer Support Lisa Banks Distributed Systems Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any

More information

Revolutionize the Way You Work With IMS Applications Using IBM UrbanCode Deploy Evgeni Liakhovich, IMS Developer

Revolutionize the Way You Work With IMS Applications Using IBM UrbanCode Deploy Evgeni Liakhovich, IMS Developer Revolutionize the Way You Work With IMS Applications Using IBM UrbanCode Deploy Evgeni Liakhovich, IMS Developer evgueni@us.ibm.com * 2016 IBM Corporation Trademarks, copyrights, disclaimers IBM, the IBM

More information

Big Brother is Watching Your Big Data: z/os Actions Buried in the FISMA Security Regulation

Big Brother is Watching Your Big Data: z/os Actions Buried in the FISMA Security Regulation Big Brother is Watching Your Big Data: z/os Actions Buried in the FISMA Security Regulation Bill Valyo CA Technologies February 7, 2013 Session #12765 Quick Abstract: About this Presentation This presentation

More information

Steps to Access ESR Tool

Steps to Access ESR Tool Steps to Access ESR Tool 1. Register on the software support site (www.ibm.com/software/support) - Only register once - Use email address for IBM ID 2. Be added to an authorized caller list by a Site Technical

More information

Security zsecure Service Stream Enhancement for PCI-DSS support Version Documentation updates for User Reference Manual for Top Secret

Security zsecure Service Stream Enhancement for PCI-DSS support Version Documentation updates for User Reference Manual for Top Secret Security zsecure Serice Stream Enhancement for PCI-DSS support Version 2.1.0 Documentation updates for User Reference Manual for Top Secret Security zsecure Serice Stream Enhancement for PCI-DSS support

More information

What s New in the IBM Lotus Notes Client. Kevin O Connell, Consulting Manager, IBM Asia Pacific

What s New in the IBM Lotus Notes Client. Kevin O Connell, Consulting Manager, IBM Asia Pacific Technical Track What s New in the IBM Lotus Notes Client Kevin O Connell, Consulting Manager, IBM Asia Pacific ID101 What's New in the IBM Lotus Notes Client Kevin O'Connell Asia Pacific Consulting Manager

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform

More information

Benchmarking z/os Development Tasks - Comparing Programmer Productivity using RDz and ISPF

Benchmarking z/os Development Tasks - Comparing Programmer Productivity using RDz and ISPF IBM Software Group Benchmarking z/os Development Tasks - Comparing Programmer Productivity using RDz and ISPF Jon Sayles RDz Technical Enablement jsayles@us.ibm.com 2010 IBM Corporation Agenda and Disclaimer

More information

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security

More information

Compliance and Event Monitoring Using the PowerSC Tools for IBM i Compliance Monitoring and Reporting Tool

Compliance and Event Monitoring Using the PowerSC Tools for IBM i Compliance Monitoring and Reporting Tool Compliance and Event Monitoring Using the PowerSC Tools for IBM i Compliance Monitoring and Reporting Tool Terry Ford Senior Managing Consultant IBM Lab Services Power Systems Delivery taford@us.ibm.com

More information

IBM Security Guardium: Troubleshooting No Traffic Issues

IBM Security Guardium: Troubleshooting No Traffic Issues IBM Security Guardium: Troubleshooting No Traffic Issues IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Security Guardium Tech Talk

IBM Security Guardium Tech Talk IBM Security Guardium Tech Talk What s new in Vulnerability Assessment V10 Kathy Zeidenstein Guardium Evangelist Frank Cavaliero - Database Administrator Louis Lam - Database and VA Manager Vikalp Paliwal

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information