IBM Systems Magazine, Mainframe - May/June 2015 - 37

TECH SHOWCASE
SPONSORED CONTENT

"One of the problems we're trying
to solve is how to provide trusted
end-point integrity, firmware updates,
anomaly behavior detection and
things like that."
-Christopher Poulin, research strategist, IBM X-Force

their heads over, trying to figure
out how you cover an ecosystem
that's so broad and do it well on
every platform."
In general, front-line protection
rests with the manufacturer. Particularly in the enterprise space,
though, end users must take steps
to protect themselves, especially
if they are connecting IoT devices
to their enterprise network. The
straightforward way to keep the
network safe is to monitor equipment to see what it's doing versus
what it's supposed to be doing.
This fits with the report's recommendations to establish strong
authentication and control techniques that allow only approved
users and devices to access data
or other parts of the network, an
essential security technique.
It's the opposite of computer
security, which typically involves
blacklisting only certain specified
activities and allowing everything
else. For IoT devices and systems,
the idea is to whitelist only a
small subset of activities and protect everything else. If the device
or network initiates action outside

of those restrictions, the system
should block the attempt or send
an alert.

Challenge Lies
in the Execution
Whether for makers or end users,
security must be factored into a
design or installation from the
beginning. The issue gets less
attention than it should, particularly from small and medium
businesses. That's a problem,
given that the IoT manufacturing
base features a large number of
startups. This group might think
about the issue but it doesn't
necessarily have the resources to
address it.
Of course, large companies are
not immune to making security
gaffes of their own. A common
error is for end users to buy a
security application but neglect
the follow-through. Security is
a process, not a product, as the
saying goes. The problem is that
the process frequently falls to the
IT department, which already has
its hands full with the basic work
of running servers.

More Information
Review the entire IBM X-Force Threat Intelligence Quarterly:
bit.ly/1Juoomt

Clean Audits
Do NOT Mean
You Are Secure
Enterprises that suffer data breaches
have most likely passed all of their
required security audits. Clearly,
passing audits does not guarantee systems are secure. IT security
DXGLWVÃOLNHÃWKHÃÀ
ÃQDQFLDOÃDXGLWVÃWKDWÃ
LQÁ
ÃXHQFHGÃWKHLUÃDSSURDFKÃUHYLHZÃ
DÃVWDWLVWLFDOO\ÃVLJQLÀ
ÃFDQWÃVDPSOHÃRIÃ
VHFXULW\ÃFRQÀ
ÃJXUDWLRQÃFRQWUROVÃQRWÃ
DOOÃRIÃWKHPÃ$ôQRÃÀ
ÃQGLQJμÃVLPSO\Ã
means that of the samples tested no
VHFXULW\ÃFRQÀ
ÃJXUDWLRQÃFRQWUROÃZDVÃ
RXWVLGHÃWKHÃVWDQGDUGÃ$ôQRÃÀ
ÃQGLQJμÃ
does not mean that all instances
ZKHUHÃVHFXULW\ÃFRQÀ
ÃJXUDWLRQÃFRQ
trols are required are compliant. In
addition, IT security audits are limited
in time and say nothing about the
state of security before or after an
audit took place.
,IÃQRWÃFRQÀ
ÃJXUHGÃFRUUHFWO\ÃDÃPDLQ
frame is vulnerable to attack. When
performing security assessments
ZKHUHÃDOOÃLQVWDQFHVÃRIÃHDFKÃVHFXULW\Ã
FRQÀ
ÃJXUDWLRQÃFRQWUROÃUHTXLUHPHQWÃ
DUHÃUHYLHZHGÃRQÃKXQGUHGVÃRIÃ
mainframes, Vanguard found that
PRVWÃKDGÃVHYHUHÃVHFXULW\ÃFRQÀ
ÃJXUD
tion problems requiring immediate
remediation.
7KHÃEHVWÃZD\ÃWRÃVHFXUHÃ\RXUÃPDLQ
frame is to do a full assessment,
UHPHGLDWHÃWKHÃFULWLFDOÃÀ
ÃQGLQJVÃDQGÃ
implement processes to prevent
future problems from occurring.

Steven Ringelberg

&KLHIÃRSHUDWLQJÃRIÀ
ÃFHU
Vanguard Integrity Professionals
Steven Ringelberg is a technology
industry veteran and an expert on
WKHÃEXVLQHVVÃEHQHÀ
ÃWVÃRIÃVHUYHUOHYHOÃ
security and compliance.

ibmsystemsmag.com MAY/JUNE 2015 // 37


http://www.bit.ly/1Juoomt http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - May/June 2015

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - May/June 2015

Table of Contents
IBM Perspective: A mainframe built for Generation Z
Editor's Desk: Optimistic future
Partner PoV: Now is the time for multifactor authentication
Infographic: Myths, exaggerations and uncomfortable truths
Currents: TCO for an IBM z13 cloud is lower than an x86 or public cloud, according to an IBM study
R&D: IBM Research is working to better diagnose osteoporosis -- and make computing more economical
Cover Story: Mastering the Mainframe: IBM contest connects millennials to the mainframe and potential employers
Feature: The Millennial Career Guidebook: Six groups and resources to help mainframers starting their careers
Feature: Mainframe Within Reach: IBM provides a rich set of solutions designed to help new mainframe programmers
Tech Showcase: IBM X-Force report reveals challenges and strategies to succeed in the new computing environment
Tech Corner: New IBM z13 chip improves throughput and analytics performance
Solutions: ReACT V4.0; Ivory Service Architect V4.6
Stop Run: Running and fencing keep IBMer active
Reference Point - Global Events, Education, Resources for Mainframe
2015 Mainframe Solutions Edition Product Index
Linux on z E-book
IBM Systems Magazine, Mainframe - May/June 2015 - Intro
IBM Systems Magazine, Mainframe - May/June 2015 - Cover1
IBM Systems Magazine, Mainframe - May/June 2015 - Cover2
IBM Systems Magazine, Mainframe - May/June 2015 - 1
IBM Systems Magazine, Mainframe - May/June 2015 - Table of Contents
IBM Systems Magazine, Mainframe - May/June 2015 - 3
IBM Systems Magazine, Mainframe - May/June 2015 - 4
IBM Systems Magazine, Mainframe - May/June 2015 - IBM Perspective: A mainframe built for Generation Z
IBM Systems Magazine, Mainframe - May/June 2015 - Editor's Desk: Optimistic future
IBM Systems Magazine, Mainframe - May/June 2015 - 7
IBM Systems Magazine, Mainframe - May/June 2015 - Partner PoV: Now is the time for multifactor authentication
IBM Systems Magazine, Mainframe - May/June 2015 - 9
IBM Systems Magazine, Mainframe - May/June 2015 - Infographic: Myths, exaggerations and uncomfortable truths
IBM Systems Magazine, Mainframe - May/June 2015 - Currents: TCO for an IBM z13 cloud is lower than an x86 or public cloud, according to an IBM study
IBM Systems Magazine, Mainframe - May/June 2015 - 12
IBM Systems Magazine, Mainframe - May/June 2015 - 13
IBM Systems Magazine, Mainframe - May/June 2015 - 14
IBM Systems Magazine, Mainframe - May/June 2015 - 15
IBM Systems Magazine, Mainframe - May/June 2015 - R&D: IBM Research is working to better diagnose osteoporosis -- and make computing more economical
IBM Systems Magazine, Mainframe - May/June 2015 - 17
IBM Systems Magazine, Mainframe - May/June 2015 - 18
IBM Systems Magazine, Mainframe - May/June 2015 - 19
IBM Systems Magazine, Mainframe - May/June 2015 - Cover Story: Mastering the Mainframe: IBM contest connects millennials to the mainframe and potential employers
IBM Systems Magazine, Mainframe - May/June 2015 - 21
IBM Systems Magazine, Mainframe - May/June 2015 - 22
IBM Systems Magazine, Mainframe - May/June 2015 - 23
IBM Systems Magazine, Mainframe - May/June 2015 - Feature: The Millennial Career Guidebook: Six groups and resources to help mainframers starting their careers
IBM Systems Magazine, Mainframe - May/June 2015 - 25
IBM Systems Magazine, Mainframe - May/June 2015 - 26
IBM Systems Magazine, Mainframe - May/June 2015 - 27
IBM Systems Magazine, Mainframe - May/June 2015 - 28
IBM Systems Magazine, Mainframe - May/June 2015 - 29
IBM Systems Magazine, Mainframe - May/June 2015 - Feature: Mainframe Within Reach: IBM provides a rich set of solutions designed to help new mainframe programmers
IBM Systems Magazine, Mainframe - May/June 2015 - 31
IBM Systems Magazine, Mainframe - May/June 2015 - 32
IBM Systems Magazine, Mainframe - May/June 2015 - Tech Showcase: IBM X-Force report reveals challenges and strategies to succeed in the new computing environment
IBM Systems Magazine, Mainframe - May/June 2015 - 34
IBM Systems Magazine, Mainframe - May/June 2015 - 35
IBM Systems Magazine, Mainframe - May/June 2015 - 36
IBM Systems Magazine, Mainframe - May/June 2015 - 37
IBM Systems Magazine, Mainframe - May/June 2015 - 38
IBM Systems Magazine, Mainframe - May/June 2015 - 39
IBM Systems Magazine, Mainframe - May/June 2015 - 40
IBM Systems Magazine, Mainframe - May/June 2015 - 41
IBM Systems Magazine, Mainframe - May/June 2015 - Tech Corner: New IBM z13 chip improves throughput and analytics performance
IBM Systems Magazine, Mainframe - May/June 2015 - 43
IBM Systems Magazine, Mainframe - May/June 2015 - 44
IBM Systems Magazine, Mainframe - May/June 2015 - 45
IBM Systems Magazine, Mainframe - May/June 2015 - 46
IBM Systems Magazine, Mainframe - May/June 2015 - Solutions: ReACT V4.0; Ivory Service Architect V4.6
IBM Systems Magazine, Mainframe - May/June 2015 - Stop Run: Running and fencing keep IBMer active
IBM Systems Magazine, Mainframe - May/June 2015 - Cover3
IBM Systems Magazine, Mainframe - May/June 2015 - Cover4
IBM Systems Magazine, Mainframe - May/June 2015 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - May/June 2015 - RF2
IBM Systems Magazine, Mainframe - May/June 2015 - Linux on z E-book
IBM Systems Magazine, Mainframe - May/June 2015 - L2
IBM Systems Magazine, Mainframe - May/June 2015 - L3
IBM Systems Magazine, Mainframe - May/June 2015 - L4
IBM Systems Magazine, Mainframe - May/June 2015 - L5
IBM Systems Magazine, Mainframe - May/June 2015 - L6
IBM Systems Magazine, Mainframe - May/June 2015 - L7
IBM Systems Magazine, Mainframe - May/June 2015 - L8
IBM Systems Magazine, Mainframe - May/June 2015 - L9
IBM Systems Magazine, Mainframe - May/June 2015 - L10
IBM Systems Magazine, Mainframe - May/June 2015 - L11
IBM Systems Magazine, Mainframe - May/June 2015 - L12
IBM Systems Magazine, Mainframe - May/June 2015 - L13
IBM Systems Magazine, Mainframe - May/June 2015 - L14
IBM Systems Magazine, Mainframe - May/June 2015 - L15
IBM Systems Magazine, Mainframe - May/June 2015 - L16
IBM Systems Magazine, Mainframe - May/June 2015 - L17
IBM Systems Magazine, Mainframe - May/June 2015 - L18
IBM Systems Magazine, Mainframe - May/June 2015 - L19
IBM Systems Magazine, Mainframe - May/June 2015 - L20
IBM Systems Magazine, Mainframe - May/June 2015 - L21
IBM Systems Magazine, Mainframe - May/June 2015 - 2015 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - May/June 2015 - SE2
IBM Systems Magazine, Mainframe - May/June 2015 - SE3
IBM Systems Magazine, Mainframe - May/June 2015 - SE4
IBM Systems Magazine, Mainframe - May/June 2015 - SE5
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com