IBM Systems Magazine, Mainframe - July/August 2014 - 36

Figure 1: Possible Attack Surfaces

Mobile advances and cloud
computing have exponentially
expanded the number of attack
surfaces, or places unauthorized
users could enter or receive data,
with a wider range of people
and access points (see Figure 1,
above). Employees are no longer
the only group that can get to
company data. Now, outsourcers,
suppliers, consultants and
customers all are granted access
to various forms of structured
and unstructured data.
Accessing data is possible
via system, Web, mobile and
cloud-based applications, and
the data infrastructure can
include mainframes, laptops and
desktops, mobile devices, cloud
storage, and even DVRs and
vehicle systems. The Internet of
Things creates an open-ended
list of possibilities.
With so many access points
and attack surfaces, threats have
grown in scope from thousands
of events to millions, and
threat management is making a
necessary shift to a more proactive
and automated approach based
on security intelligence versus the
reactive approaches of the past.
With a Common Criteria
Evaluation Assurance Level

5+, the IBM System z* platform
is one of the most secure
operating systems commercially
available. It can proactively
prepare companies for threats
through a rigorous analysis
of security events. And with
integrated authentication and
access control provided by
the IBM RACF* offering, IBM
zEnterprise* solutions allow
companies to centrally manage
user identities, passwords
and rights across the entire
enterprise. Businesses can also
rest assured that their access
and identity security systems
align with the latest growing list
of regulations and standards.
Ultimately, the greatest threat
to business security and data
integrity is people. Whether
actions are intentional or
accidental, both internal and
external threats stem from the
people who have any number
of permissions while accessing
company data every day.
Taking a proactive stance
against those threats and
actively managing identities
and access are two keys to
being prepared as the number
of threats and attack surfaces
continues to grow.

36 // JULY/AUGUST 2014 ibmsystemsmag.com

Building on a Foundation
of Security

D
Learn More

To find out how
IBM can protect
your company's
mainframe
in a growing
virtual business
environment,
visit:
www.ibm.
com/software/
os/systemz/
security

It's one thing to have an understanding of just how segmented
security issues can be in business,
it's another to make the move
to employ protective measures
through a system that's founded
on security. Like all IBM developments, System z servers are driven
by security best practices.
Spanning an integrated
network that includes hardware,
firmware, hypervisors, operating systems and applications,
System z technology combines
several levels of security strategies. Overseeing transactions
for data analytics, business
applications and virtualization,
its highly resilient stack engages
multiple layers of redundancy
and protection. It provides
centralized and fully integrated
security at all levels.
The features of the System z
platform are a direct reflection
of IBM's commitment to design
and development practices that
prevent unauthorized application programs, subsystems
and users from bypassing IBM
z/OS* security, making it ideal
for private clouds and Linux*


http://www.ibm.com/software/os/systemz/security http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2014

Table of Contents
Editor's Desk: Protecting information
IBM Perspective: Sunny outlook on the mainframe
Techbits: Watson: your personal shopper
Infographic: How the mainframe changed our world
Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
Focus on Storage: IBM FlashSystem addresses storage and application performance issues
Currents: As data consumption expands, information protection policies must be put in place
Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
Administrator: Active/Active Sites helps distribute workloads during outages
Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
Reference Point - Global Events, Education, Resources for Mainframe
2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - Intro
IBM Systems Magazine, Mainframe - July/August 2014 - Cover1
IBM Systems Magazine, Mainframe - July/August 2014 - Cover2
IBM Systems Magazine, Mainframe - July/August 2014 - 1
IBM Systems Magazine, Mainframe - July/August 2014 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2014 - 3
IBM Systems Magazine, Mainframe - July/August 2014 - 4
IBM Systems Magazine, Mainframe - July/August 2014 - 5
IBM Systems Magazine, Mainframe - July/August 2014 - Editor's Desk: Protecting information
IBM Systems Magazine, Mainframe - July/August 2014 - 7
IBM Systems Magazine, Mainframe - July/August 2014 - IBM Perspective: Sunny outlook on the mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 9
IBM Systems Magazine, Mainframe - July/August 2014 - Techbits: Watson: your personal shopper
IBM Systems Magazine, Mainframe - July/August 2014 - 11
IBM Systems Magazine, Mainframe - July/August 2014 - Infographic: How the mainframe changed our world
IBM Systems Magazine, Mainframe - July/August 2014 - 13
IBM Systems Magazine, Mainframe - July/August 2014 - Partner PoV: ISVs can help mainframe customers keep up with a rapidly evolving environment
IBM Systems Magazine, Mainframe - July/August 2014 - 15
IBM Systems Magazine, Mainframe - July/August 2014 - Focus on Storage: IBM FlashSystem addresses storage and application performance issues
IBM Systems Magazine, Mainframe - July/August 2014 - 17
IBM Systems Magazine, Mainframe - July/August 2014 - 18
IBM Systems Magazine, Mainframe - July/August 2014 - 19
IBM Systems Magazine, Mainframe - July/August 2014 - Currents: As data consumption expands, information protection policies must be put in place
IBM Systems Magazine, Mainframe - July/August 2014 - 21
IBM Systems Magazine, Mainframe - July/August 2014 - 22
IBM Systems Magazine, Mainframe - July/August 2014 - 23
IBM Systems Magazine, Mainframe - July/August 2014 - Case Study: Credit Where Credit's Due: Isracard Group devises a novel way to verify its system integrity before disaster occurs
IBM Systems Magazine, Mainframe - July/August 2014 - 25
IBM Systems Magazine, Mainframe - July/August 2014 - 26
IBM Systems Magazine, Mainframe - July/August 2014 - 27
IBM Systems Magazine, Mainframe - July/August 2014 - 28
IBM Systems Magazine, Mainframe - July/August 2014 - 29
IBM Systems Magazine, Mainframe - July/August 2014 - Cover Story: A Secure Fortress: The mainframe delivers the reliability, safety and cost-effectiveness your IT shop needs
IBM Systems Magazine, Mainframe - July/August 2014 - 31
IBM Systems Magazine, Mainframe - July/August 2014 - 32
IBM Systems Magazine, Mainframe - July/August 2014 - 33
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Be Proactive in Risk Management: Protecting data is crucial as your business connects in ever-increasing ways along the access superhighway
IBM Systems Magazine, Mainframe - July/August 2014 - 35
IBM Systems Magazine, Mainframe - July/August 2014 - 36
IBM Systems Magazine, Mainframe - July/August 2014 - 37
IBM Systems Magazine, Mainframe - July/August 2014 - Feature: Being Risk-Aware: New IBM and Ponemon study examines the economics of IT risk and reputation
IBM Systems Magazine, Mainframe - July/August 2014 - 39
IBM Systems Magazine, Mainframe - July/August 2014 - 40
IBM Systems Magazine, Mainframe - July/August 2014 - 41
IBM Systems Magazine, Mainframe - July/August 2014 - 42
IBM Systems Magazine, Mainframe - July/August 2014 - 43
IBM Systems Magazine, Mainframe - July/August 2014 - Administrator: Active/Active Sites helps distribute workloads during outages
IBM Systems Magazine, Mainframe - July/August 2014 - 45
IBM Systems Magazine, Mainframe - July/August 2014 - 46
IBM Systems Magazine, Mainframe - July/August 2014 - 47
IBM Systems Magazine, Mainframe - July/August 2014 - Tech Corner: A point-in-time tool, Runtime Diagnostics can find issues in a pinch
IBM Systems Magazine, Mainframe - July/August 2014 - 49
IBM Systems Magazine, Mainframe - July/August 2014 - 50
IBM Systems Magazine, Mainframe - July/August 2014 - 51
IBM Systems Magazine, Mainframe - July/August 2014 - Solutions: Reflection 2014; CA Chorus; VFTP 3.0; Lifecycle Manager; STEPLIB-Rx; Ivory VisualConnect; Mainframe Abend Assist; Linux Enterprise Server Starter System for System z
IBM Systems Magazine, Mainframe - July/August 2014 - 53
IBM Systems Magazine, Mainframe - July/August 2014 - 54
IBM Systems Magazine, Mainframe - July/August 2014 - 55
IBM Systems Magazine, Mainframe - July/August 2014 - Stop Run: Together, IBM executives Pat Toole Jr. and Pat Toole St. bring more than half a century of dedication to the company
IBM Systems Magazine, Mainframe - July/August 2014 - Cover3
IBM Systems Magazine, Mainframe - July/August 2014 - Cover4
IBM Systems Magazine, Mainframe - July/August 2014 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2014 - 2014 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2014 - SE2
IBM Systems Magazine, Mainframe - July/August 2014 - SE3
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20201112
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com