IBM Systems Magazine, Mainframe Edition - January/February 2010 - 38

meet your organization’s security policy requirements, legal requirements, and the compliance requirements of all of the laws and regulations that apply to your organization. Much of whether cloud computing meets your business requirements depends on the type of data being stored, manipulated or shared in the cloud. If you’re thinking of using the cloud to manage i nfor mat ion contai n i ng personally identifiable information (PII), HIPAA or Payment Card Industry (PCI) data, or data that’s highly confidential or valuable to your organization, examine your organization’s security policy. For example, if you store credit card numbers, your security policy will reflect the PCI requirements that cardholder data be encrypted when it f lows over a public network or when it’s at rest. If you’re going to send PCI or any other data that’s required to be encrypted to the cloud, you’ll want to question the provider to determine if it can meet your encryption needs. And don’t forget about the encryption key management requirements. You’ll also want to make sure access controls can be set on these objects and that they’re set to “deny by default.” And question the provider’s security practices. Here are some of the questions I’d ask: s )S ADMINISTRATOR ÈROOTÉ ACCESS LIMITED to only those requiring that power? s $O ADMINISTRATORS ACCESS THE SERVERS via encrypted sessions? s 7HATÇS T HE PATCH MANAGEMENT strategy? s $O YOU RUN ANTIVIRUS AND MALWARE protection software? s $O SERVER CONFIGURATIONS COMPLY WITH PCI (or HIPAA or Sarbanes-Oxley)? s 7HAT ARE THE PASSWORD REQUIREMENTS and composition rules? s #AN THE PASSWORD RULES BE SET TO MATCH your organization’s requirements? Most organizations’ security policies address the actions to be taken during EMPLOYEE TERMINATIONS OR LAYOFFS 7ITHIN your organization, these actions are simultaneous with the employment action. You’ll want to ask the cloud provider whether they can quickly identify and shut down accounts former employees used to ensure their access is removed immediately. Another question to ask the provider is what logging is performed. Compliance with many laws and regulations usually requires some level of logging (auditing) be performed. Your security policy may require logging administrator functions, authority failures, reading healthcare data, failed login attempts and more. Another aspect to consider is the possibility your organization’s information could fall into hackers’ hands if the cloud provider becomes the victim of a targeted attack. Some intrusions succeed because of poor configurations that let hackers easily access an organization’s network. Other intrusions are targeted because of THE VALUE OR VOLUME OF DATA 7HILE IT MAY BE relatively easy to avoid attacks that exploit poor choices in security settings (just use relatively secure settings and the hacker will likely move on to the next target), defending against a targeted attack is basically like going to war with a hacker. Because cloud providers store great volumes of data, they may become victims of targeted attacks. 7HAT DAMAGE WOULD YOUR ORGANIZATION incur if its information stored in the cloud were stolen? Perhaps the answer is none. But depending on the type of data, the result could be very costly—compromised trade secrets—or signal a need to put your breach notification plan into action. Providers could also become victims of denial of service attacks. Measure what the effects on your organization would be if the service or data stored in the cloud were unavailable. If your organization is in the unfortunate position of being a party to a lawsuit, part of the discovery process may require some of your organization’s electronic data be submitted for review. Typically called e-discovery, this can include e-mail, databases, documents and instant-message chats. Before turning to the cloud for e-mail services, you’ll want to check the provider’s data retention policy. It should match your organization’s so data isn’t retained too briefly or for too long. You’ll also want WHAT IS CLOUD COMPUTING? Cloud computing is a style of computing in which dynamically scalable, often virtualized resources are provided as a service over the Internet. Users don't need knowledge of, expertise in or control over the technology infrastructure in the cloud that supports the resources. Cloud computing incorporates many concepts, such as Infrastructure as a Service, Software as a Service and Web 2.0, with a common reliance on Internet technologies. For more, see the IBM Cloud Computing Web page (www.ibm.com/ibm/cloud). JANUARY/FEBRUARY 2010 ibmsystemsmag.com/mainframe

IBM Systems Magazine, Mainframe Edition - January/February 2010

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe Edition - January/February 2010

IBM Systems Magazine, Mainframe Edition - January/February 2010
Table of Contents
Editor's Desk: Change is a-Comin'
Dashboard: Honoring Blue Gene
Think Smarter: Virtualization is Key to a Dynamic Infrastructure
Data Display: Top Technologies for 2010
Insider: The Business Case for Implementing a Deduplication Solution on System z
Trends: IBM Smart Analytics Cloud Overcomes Key BI Obstacles
Cover Story: The System z Server Continues to Evolve to Meet Emerging IT Needs
Feature: Security Considerations to Protect Your Organization
Technical Corner: IBM has Business-Value-Driven Solutions to Improve Application and Employee Productivity
Solutions: What’s New in the Marketplace
Resources: Advertisers' Index
Stop Run: Scott Hayes' Best DB2 Teaching Tool is Humor
IBM Systems Magazine, Mainframe Edition - January/February 2010 - IBM Systems Magazine, Mainframe Edition - January/February 2010
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Cover2
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 1
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Table of Contents
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 3
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 4
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 5
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 6
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 7
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 8
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 9
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Editor's Desk: Change is a-Comin'
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 11
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Dashboard: Honoring Blue Gene
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 13
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Think Smarter: Virtualization is Key to a Dynamic Infrastructure
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 15
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 16
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 17
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Data Display: Top Technologies for 2010
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 19
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 20
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 21
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Insider: The Business Case for Implementing a Deduplication Solution on System z
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 23
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 24
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 25
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Trends: IBM Smart Analytics Cloud Overcomes Key BI Obstacles
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 27
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 28
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 29
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Cover Story: The System z Server Continues to Evolve to Meet Emerging IT Needs
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 31
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 32
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 33
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 34
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 35
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Feature: Security Considerations to Protect Your Organization
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 37
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 38
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 39
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 40
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 41
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Technical Corner: IBM has Business-Value-Driven Solutions to Improve Application and Employee Productivity
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 43
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 44
IBM Systems Magazine, Mainframe Edition - January/February 2010 - 45
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Solutions: What’s New in the Marketplace
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Resources: Advertisers' Index
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Stop Run: Scott Hayes' Best DB2 Teaching Tool is Humor
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Cover3
IBM Systems Magazine, Mainframe Edition - January/February 2010 - Cover4
IBM Systems Magazine, Mainframe Edition - January/February 2010 - RF1
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com