IBM Systems magazine, IBM Z Nov/Dec 2020 - SD33

PARTNER PERSPECTIVE

SPO NSORED CONT E NT

Are Mainframes
Your Weakest Link?

BMC
CHRISTOPHER PERRY
LEAD PRODUCT
MANAGER FOR
BMC AMI FOR
SECURITY
Christopher is
the lead product
manager for BMC AMI
for Security. Prior to
BMC, he served in the
U.S. Army in several
cybersecurity roles.
Christopher_perry@bmc.com
571-521-8717

The information security market has grown tremendously over the past
two decades as major cyberattacks have resulted in more than $10 billion in
damabes1 and revealed millions of pieces of personally identifiable information2. New legislation begins fining companies for failure to take appropriate
measures3. Yet, the vast majority of defensive systems are designed solely
for distributed platforms and fully ignore the mainframes, which run the
majority of the world's financial transactions and maintain the most sensitive data.
The mainframe has earned years of
security through obscurity because the
original hacker culture simply lacked
access to the prohibitively expensive
system to break and pen test. Today, the
cost of access for nation state sponsored
advanced persistent threats, the ubiquity
of Linux* on IBM Z* and access to a
virtualized z/OS* platform have lowered
the barrier to entry for malicious actors.
This necessitates that companies
begin protecting the backbone of the IT
infrastructure from more than the auditor.
Companies have learned this lesson the
hard way. Stories of hackings have made headlines internationally4. Even
the mainframe is not immune. Hackers have had the capacity to destroy a
company's most vital information. The only way to effectively detect and respond to attacks is to use tools that have real-time notification and monitoring of mainframe events aggregated into the enterprise SIEM where security
analysts can immediately spot unauthorized users escalating privileges,
access to the mainframe's most sensitive files and modification of sensitive
datasets.
Within a few hours, the hackers had full control of the victim's mainframe.
At this point, the hackers had the full capability to encrypt and destroy the
company's most vital information. The only way to effectively detect and
respond to attacks like this is to use tools that have real-time notification
and monitoring of mainframe events aggregated into the enterprise SIEM
where security analysts can immediately spot unauthorized users escalating
privileges, access to the mainframe's most sensitive files, and modification
of sensitive datasets.
The time to prevent stories like this from being about your organization is
now. Include your mainframe in your security architecture and ensure you
can perform endpoint detection and response to security incidents before
you are in the headlines. ■

Include your
mainframe in
your security
architecture ...
before you're in
the headlines.

1 https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
2 https://arstechnica.com/information-technology/2018/05/equifax-breach-exposed-millions-of-drivers-licenses-phone-numbersemails/
3 https://blogs.dlapiper.com/privacymatters/germany-first-data-protection-authority-issues-gdpr-fine/
4 https://www.pcworld.com/article/2034733/pirate- bay-cofounder-charged-with-hacking-ibm-mainframes-stealing-money.html

ibmsystemsmag.com/solutions-directory 2020 33


https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ https://www.arstechnica.com/information-technology/2018/05/equifax-breach-exposed-millions-of-drivers-licenses-phone-numbers-emails/ https://www.arstechnica.com/information-technology/2018/05/equifax-breach-exposed-millions-of-drivers-licenses-phone-numbers-emails/ https://blogs.dlapiper.com/privacymatters/germany-first-data-protection-authority-issues-gdpr-fine/ https://www.pcworld.com/article/2034733/pirate-bay-cofounder-charged-with-hacking-ibm-mainframes-stealing-money.html http://www.ibmsystemsmag.com/solutions-directory

IBM Systems magazine, IBM Z Nov/Dec 2020

Table of Contents for the Digital Edition of IBM Systems magazine, IBM Z Nov/Dec 2020

Welcome: Helping clients thrive in an always-on world
Currents: Increased uptime reduces TCO for IBM Z clients
Currents: On the web
Currents: Celebrating 20 years of Linux on IBM Z
Currents: The new and improved Master the Mainframe
Features: Cyberresilience: Moving Beyond Cybersecurity: A successful resilience strategy stems from well-defined requirements for high availability, continuous operations and continuous availability
Features: Expanding Cloud Capabilities: Red Hat OpenShift can now run on IBM Z, IBM LinuxONE and IBM Power for an infrastructure-agnostic model
Techbits: Improve recovery time with IBM System Recovery Boost
Techbits: How to utilize IBM Safeguarded Copy
Techbits: Ask the expert: IBM Secure Execution
Beyond the Box: M&T Bank Senior Mainframe Security Engineer and IBM Champion Byron Smith promotes the mainframe through mentorship
IBM Systems magazine, IBM Z Nov/Dec 2020 - Intro
IBM Systems magazine, IBM Z Nov/Dec 2020 - Cover1
IBM Systems magazine, IBM Z Nov/Dec 2020 - Cover2
IBM Systems magazine, IBM Z Nov/Dec 2020 - 1
IBM Systems magazine, IBM Z Nov/Dec 2020 - 2
IBM Systems magazine, IBM Z Nov/Dec 2020 - 3
IBM Systems magazine, IBM Z Nov/Dec 2020 - 4
IBM Systems magazine, IBM Z Nov/Dec 2020 - 5
IBM Systems magazine, IBM Z Nov/Dec 2020 - Welcome: Helping clients thrive in an always-on world
IBM Systems magazine, IBM Z Nov/Dec 2020 - 7
IBM Systems magazine, IBM Z Nov/Dec 2020 - Currents: On the web
IBM Systems magazine, IBM Z Nov/Dec 2020 - 9
IBM Systems magazine, IBM Z Nov/Dec 2020 - 10
IBM Systems magazine, IBM Z Nov/Dec 2020 - 11
IBM Systems magazine, IBM Z Nov/Dec 2020 - Currents: Celebrating 20 years of Linux on IBM Z
IBM Systems magazine, IBM Z Nov/Dec 2020 - 13
IBM Systems magazine, IBM Z Nov/Dec 2020 - Currents: The new and improved Master the Mainframe
IBM Systems magazine, IBM Z Nov/Dec 2020 - 15
IBM Systems magazine, IBM Z Nov/Dec 2020 - 16
IBM Systems magazine, IBM Z Nov/Dec 2020 - 17
IBM Systems magazine, IBM Z Nov/Dec 2020 - Features: Cyberresilience: Moving Beyond Cybersecurity: A successful resilience strategy stems from well-defined requirements for high availability, continuous operations and continuous availability
IBM Systems magazine, IBM Z Nov/Dec 2020 - 19
IBM Systems magazine, IBM Z Nov/Dec 2020 - 20
IBM Systems magazine, IBM Z Nov/Dec 2020 - 21
IBM Systems magazine, IBM Z Nov/Dec 2020 - 22
IBM Systems magazine, IBM Z Nov/Dec 2020 - 23
IBM Systems magazine, IBM Z Nov/Dec 2020 - Features: Expanding Cloud Capabilities: Red Hat OpenShift can now run on IBM Z, IBM LinuxONE and IBM Power for an infrastructure-agnostic model
IBM Systems magazine, IBM Z Nov/Dec 2020 - 25
IBM Systems magazine, IBM Z Nov/Dec 2020 - 26
IBM Systems magazine, IBM Z Nov/Dec 2020 - 27
IBM Systems magazine, IBM Z Nov/Dec 2020 - Techbits: Improve recovery time with IBM System Recovery Boost
IBM Systems magazine, IBM Z Nov/Dec 2020 - 29
IBM Systems magazine, IBM Z Nov/Dec 2020 - Techbits: How to utilize IBM Safeguarded Copy
IBM Systems magazine, IBM Z Nov/Dec 2020 - Techbits: Ask the expert: IBM Secure Execution
IBM Systems magazine, IBM Z Nov/Dec 2020 - Beyond the Box: M&T Bank Senior Mainframe Security Engineer and IBM Champion Byron Smith promotes the mainframe through mentorship
IBM Systems magazine, IBM Z Nov/Dec 2020 - Cover3
IBM Systems magazine, IBM Z Nov/Dec 2020 - Cover4
IBM Systems magazine, IBM Z Nov/Dec 2020 - CoverSD1
IBM Systems magazine, IBM Z Nov/Dec 2020 - CoverSD2
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD1
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD2
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD3
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD4
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD5
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD6
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD7
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD8
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD9
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD10
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD11
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD12
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD13
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD14
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD15
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD16
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD17
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD18
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD19
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD20
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD21
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD22
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD23
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD24
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD25
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD26
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD27
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD28
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD29
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD30
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD31
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD32
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD33
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD34
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD35
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD36
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD39
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD40
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD41
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD42
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD43
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD44
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD45
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD46
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD47
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD48
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD49
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD50
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD51
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD52
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD53
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD54
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD55
IBM Systems magazine, IBM Z Nov/Dec 2020 - SD56
IBM Systems magazine, IBM Z Nov/Dec 2020 - CoverSD3
IBM Systems magazine, IBM Z Nov/Dec 2020 - CoverSD4
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20201112
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com