IBM Systems Magazine, Mainframe - July/August 2014 - 22

CURRENTS

reporting, data-level access
control, database vulnerability
management and auto-discovery
of sensitive data. The scalable,
enterprisewide Guardium solution
provides security to high-value
data sources such as databases,
data warehouses, file shares,
enterprise applications and opensource environments, file systems,
Hadoop and big data sources. It
also offers protection by device
identification, IP address and user
identification, such as in mobile
phone transactions.
Though Guardium has many
features to protect data, its
three main elements are Data
Encryption, Data Activity Monitor
and Vulnerability Assessment.
Guardium Data Encryption for
DB2* and IMS* databases allows
for the exploitation of the latest
System z encryption capabilities
as delivered in the CEX4C
cryptographic hardware element.
By doing this, it ensures any
direct access to the underlying
database containers only result in
encrypted data being presented
to the requesting process. It forces
all access through the database
management system, which will
result in clear-text data.
The encryption capabilities
within Guardium are among the
strongest and most secure in the
industry. With level 5 encryption,
users are assured transparent,
rapid implementation,

Learn More
System z Security Software
www.ibm.com/software/os/systemz/security
InfoSphere Guardium
www.ibm.com/software/data/guardium
InfoSphere Optim
www.ibm.com/software/data/optim

centralized key and policy management, and
compliance-ready capabilities to safeguard
structured and unstructured data with minimal
performance impact.
The Data Activity Monitor layer delivers
continuous real-time monitoring and auditing,
helping prevent privileged users from interfering
with the collection of audit data or contaminating
its source. Real-time monitoring detects threats
and proactively prevents them from becoming
future breaches. The solution also provides
automated compliance workflows that model the
latest industry regulatory and compliance laws.
These capabilities make the compliance and audit
a real-time actionable process, with immediate
alerting, exception processing and trackable signoff
of processes.
Guardium Vulnerability Assessment enables
organizations to assess database infrastructure
vulnerabilities and take remedial actions. It
identifies exposures such as missing patches,
weak passwords, unauthorized changes and
misconfigured privileges. It also provides full
reports with suggestions to address such issues.
Users can automate vulnerability, configuration
and behavioral assessment by scanning the entire
database infrastructure, as well as evaluate and
document database security to help assess, escalate
and resolve risks.

Optim Maintains
Data Safely
Putting controls in place to
manage and monitor who can see
and access data is important, but
sometimes real data must be used
to develop and test new applications or in analytical scenarios
where personal information is not
required. In many industries, laws
mandate data privacy.
Many organizations believe the
only way to test an application is
by using real data because it represents the real scenarios. Cloning
the data for test, development,
quality assurance and training
multiplies your risk factor. IBM
InfoSphere Optim* solutions
provide an effective strategy to
maintain meaningful data without exposing its real values.
InfoSphere Optim Test Data
Management for System z
selects just enough data so that
applications can be thoroughly
tested, yet data management staff
aren't overburdened with full
production database clones.
InfoSphere Optim Data Masking
for System z masks sensitive
data values by de-identifying
them, yet maintaining their
behavioral characteristics. The
solution provides a wide range
of predefined and user-defined
algorithms to mask the data. To
maintain data relationships, the
InfoSphere Optim key propagation
retains referential integrity of

Serious Security Breaches
October 2013: An Adobe Systems breach impacted at
least 38 million users (http://bit.ly/1fQ36BW).
April 2012: A data breach at a health organization
affected nearly 800,000 people and cost the hospital
$750,000 (http://1.usa.gov/1fQ3lwO).
April 2012: Hackers obtained about 1.5 million
credit card numbers from payment processor Global
Payments (http://bit.ly/1iicTQ9).

22 // JULY/AUGUST 2014 ibmsystemsmag.com

January 2012: An SQL injection campaign allowed an
attacker to take full control of an OS, database and
Web application (http://ubm.io/1myBtju).
February 2009: The personally identiļ¬able information
of more than 45,000 employees was hacked from an
unprotected server belonging to the FAA (http://bit.
ly/1huKNgD).


http://www.ibm.com/software/os/systemz/security http://www.ibm.com/software/data/guardium http://www.ibm.com/software/data/optim http://bit.ly/1fQ36BW http://ubm.io/1myBtju http://1.usa.gov/1fQ3lwO http://bit.ly/1huKNgD http://bit.ly/1huKNgD http://bit.ly/1iicTQ9 http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents
Editor's Desk: Protecting information
IBM Perspective: Sunny outlook on the mainframe
Techbits: Watson: your personal shopper
Infographic: How the mainframe changed our world
Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
Focus on Storage: IBM FlashSystem addresses storage and application performance issues
Currents: As data consumption expands, information protection policies must be put in place
Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
Administrator: Active/Active Sites helps distribute workloads during outages
Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
Reference Point - Global Events, Education, Resources for Mainframe
2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - Intro
IBM Systems Magazine, Mainframe - July/August 2014 - Cover1
IBM Systems Magazine, Mainframe - July/August 2014 - Cover2
IBM Systems Magazine, Mainframe - July/August 2014 - 1
IBM Systems Magazine, Mainframe - July/August 2014 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2014 - 3
IBM Systems Magazine, Mainframe - July/August 2014 - 4
IBM Systems Magazine, Mainframe - July/August 2014 - 5
IBM Systems Magazine, Mainframe - July/August 2014 - Editor's Desk: Protecting information
IBM Systems Magazine, Mainframe - July/August 2014 - 7
IBM Systems Magazine, Mainframe - July/August 2014 - IBM Perspective: Sunny outlook on the mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 9
IBM Systems Magazine, Mainframe - July/August 2014 - Techbits: Watson: your personal shopper
IBM Systems Magazine, Mainframe - July/August 2014 - 11
IBM Systems Magazine, Mainframe - July/August 2014 - Infographic: How the mainframe changed our world
IBM Systems Magazine, Mainframe - July/August 2014 - 13
IBM Systems Magazine, Mainframe - July/August 2014 - Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
IBM Systems Magazine, Mainframe - July/August 2014 - 15
IBM Systems Magazine, Mainframe - July/August 2014 - Focus on Storage: IBM FlashSystem addresses storage and application performance issues
IBM Systems Magazine, Mainframe - July/August 2014 - 17
IBM Systems Magazine, Mainframe - July/August 2014 - 18
IBM Systems Magazine, Mainframe - July/August 2014 - 19
IBM Systems Magazine, Mainframe - July/August 2014 - Currents: As data consumption expands, information protection policies must be put in place
IBM Systems Magazine, Mainframe - July/August 2014 - 21
IBM Systems Magazine, Mainframe - July/August 2014 - 22
IBM Systems Magazine, Mainframe - July/August 2014 - 23
IBM Systems Magazine, Mainframe - July/August 2014 - Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
IBM Systems Magazine, Mainframe - July/August 2014 - 25
IBM Systems Magazine, Mainframe - July/August 2014 - 26
IBM Systems Magazine, Mainframe - July/August 2014 - 27
IBM Systems Magazine, Mainframe - July/August 2014 - 28
IBM Systems Magazine, Mainframe - July/August 2014 - 29
IBM Systems Magazine, Mainframe - July/August 2014 - Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
IBM Systems Magazine, Mainframe - July/August 2014 - 31
IBM Systems Magazine, Mainframe - July/August 2014 - 32
IBM Systems Magazine, Mainframe - July/August 2014 - 33
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
IBM Systems Magazine, Mainframe - July/August 2014 - 35
IBM Systems Magazine, Mainframe - July/August 2014 - 36
IBM Systems Magazine, Mainframe - July/August 2014 - 37
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
IBM Systems Magazine, Mainframe - July/August 2014 - 39
IBM Systems Magazine, Mainframe - July/August 2014 - 40
IBM Systems Magazine, Mainframe - July/August 2014 - 41
IBM Systems Magazine, Mainframe - July/August 2014 - 42
IBM Systems Magazine, Mainframe - July/August 2014 - 43
IBM Systems Magazine, Mainframe - July/August 2014 - Administrator: Active/Active Sites helps distribute workloads during outages
IBM Systems Magazine, Mainframe - July/August 2014 - 45
IBM Systems Magazine, Mainframe - July/August 2014 - 46
IBM Systems Magazine, Mainframe - July/August 2014 - 47
IBM Systems Magazine, Mainframe - July/August 2014 - Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
IBM Systems Magazine, Mainframe - July/August 2014 - 49
IBM Systems Magazine, Mainframe - July/August 2014 - 50
IBM Systems Magazine, Mainframe - July/August 2014 - 51
IBM Systems Magazine, Mainframe - July/August 2014 - Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
IBM Systems Magazine, Mainframe - July/August 2014 - 53
IBM Systems Magazine, Mainframe - July/August 2014 - 54
IBM Systems Magazine, Mainframe - July/August 2014 - 55
IBM Systems Magazine, Mainframe - July/August 2014 - Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
IBM Systems Magazine, Mainframe - July/August 2014 - Cover3
IBM Systems Magazine, Mainframe - July/August 2014 - Cover4
IBM Systems Magazine, Mainframe - July/August 2014 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - SE2
IBM Systems Magazine, Mainframe - July/August 2014 - SE3
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20201112
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com