IBM Systems Magazine, Mainframe - May/June 2015 - 9

point systems using some form
of multifactor authentication.
Yet, relatively few organizations
have extended these capabilities
to include their mainframe, the
system that houses most of their
critical data. While multifactor
authentication is not a panacea, it
does create another defense that
malicious attackers must conquer.
By implementing multifactor
authentication, an organization's
defenses may be stronger than
others, and malicious attackers
may go after softer targets.
In addition, many industry
guidelines and government regulations now require or recommend
that organizations use multifactor
authentication. Some examples of
industries affected include:
ĀÃ7KHÃ86ÃJRYHUQPHQWÃZLWKÃ
National Institute of Standards
DQGÃ7HFKQRORJ\ÃDQGÃ+RPHODQGÃ
Security Presidential Directive 12
requirements for all employees
and contractors accessing federal
systems (1.usa.gov/1EsAsya).
ĀÃ+HDOWKFDUHÃZLWKÃSURSRVHGÃ
'HSDUWPHQWÃRIÃ+XPDQÃ6HUYLFHVÃ
PHDVXUHVÃIRUÃ+,3$$ÃFRPSOLDQFHÃ
using two-factor authentication
for remote access to systems
with electronic protected
health information (1.usa.
gov/1AWXJt5).
ĀÃ)LQDQFLDOÃDQGÃUHWDLOÃZLWKÃ3&,Ã
DSS 3.0 requirements for
two-factor authentication for
remote access by personnel and
third parties originating outside
WKHÃQHWZRUNÃELWO\ũ$/D)Ů6
ĀÃ,QWHUQHWÃEDQNLQJÃZLWKÃ)HGHUDOÃ
)LQDQFLDOÃ,QVWLWXWLRQVÃ([DPLQD
WLRQÃ&RXQFLOÃUHFRPPHQGDWLRQVÃ
for two-factor authentication
and one-time cookie use for
consumer access (1.usa.gov/
ũ'(+/ů[
ĀÃ(QHUJ\ÃZLWKÃ1RUWKÃ$PHULFDQÃ
(OHFWULFÃ5HOLDELOLW\Ã&RUSRUD
WLRQÃ&ULWLFDOÃ,QIUDVWUXFWXUHÃ
Protection requirements for

solution (also called personal
identity validation cards or
common access control cards)
similarly requires each user to
authentication using what they
know (a password) and what
they have (the smartcard). A
software-only solution does not
require specific hardware, but
instead sends a one-time-use
passcode, valid for a specific time,
to something a user has (e.g.,
cellphone, computer or pager). All
three technologies can be used
for multifactor authentication to
applications and services.

multifactor authentication for
all Interactive Remote Access
sessions for high- and mediXPLPSDFWÃ%(6Ã&\EHUÃ6\VWHPVÃ
ELWO\ũůYůX7K

Deployment Options
Organizations that want to
deploy multifactor authentication
solutions for z Systems have to
consider various implementation
DQGÃWHFKQRORJ\ÃRSWLRQVÃ)LUVWÃ
they need to determine which
users should have multifactor
authentication capabilities. Some
will want to deploy solutions
throughout an organization, while
others may only want to provide
them to a subset of users, such as
those who have highly privileged
authority, or users who access
critical resources, data sets or
applications, regardless of the
level of authority of their user ID.
Once organizations have identified the users or resources that
should have multifactor authentication, they must determine
which technology solution or
solutions to deploy.
Many organizations have
already deployed multifactor
solutions to authenticate to other
systems, and most will want to
use these same technologies for
z Systems. Others are planning
a new deployment for the entire
organization and want to ensure
the technology they choose can
also be used to authenticate to
]Ã6\VWHPVÃ)LQDOO\ÃVRPHÃPD\ÃQRWÃ
have multifactor authentication
elsewhere, but want to deploy it
on the platform to ensure their
most critical data is protected.
7KUHHÃPDLQÃW\SHVÃRIÃWHFKQRO
ogies are used for multifactor
authentication: tokens, smartcards and software-only virtual
tokens. A token-based solution
requires each user authenticate
using what they know (a password) and what they have (the
hardware token). A smartcard

D

Three main types
of technologies
are used for
multifactor
authentication:
s 4OKENS
s 3MARTCARDS
s 3OFTWARE
ONLY
VIRTUAL TOKENS

Reduce Risk,
Ensure Compliance
Organizations that deploy multifactor authentication will reduce risks
for their most critical data, and
be able to comply with industry
and regulatory authentication
requirements. With more rigorous
authentication methods in place
on z Systems, organizations can
harden their core assets where they
reside and provide a greater level of
protection from attack. In addition, multifactor authentication
allows organizations across various
industries to meet specific industry
and regulatory requirements and
recommendations.
Over the next several years, this
type of authentication will become
widespread on z Systems, especially in organizations that protect
critical infrastructures, and provide
financial services, healthcare or
national security and defense.
With the rise in external threats
and sophisticated attackers, organizations with mainframes should
assume that malicious actors
DUHÃDOUHDG\ÃLQÃWKHLUÃQHWZRUNVÃ7RÃ
protect critical resources, these
organizations should implement
multifactor authentication,
regardless of whether users are
logging in from within the enterprise's secure premises or from
outside via a VPN.

ibmsystemsmag.com MAY/JUNE 2015 // 9


http://bit.ly/17v7uTh http://1.usa.gov/1EsAsya http://1.usa.gov/1AWXJt5 http://1.usa.gov/1AWXJt5 http://bit.ly/1ALaF6S http://1.usa.gov/1DEHL7x http://1.usa.gov/1DEHL7x http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - May/June 2015

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - May/June 2015

Table of Contents
IBM Perspective: A mainframe built for Generation Z
Editor's Desk: Optimistic future
Partner PoV: Now is the time for multifactor authentication
Infographic: Myths, exaggerations and uncomfortable truths
Currents: TCO for an IBM z13 cloud is lower than an x86 or public cloud, according to an IBM study
R&D: IBM Research is working to better diagnose osteoporosis -- and make computing more economical
Cover Story: Mastering the Mainframe: IBM contest connects millennials to the mainframe and potential employers
Feature: The Millennial Career Guidebook: Six groups and resources to help mainframers starting their careers
Feature: Mainframe Within Reach: IBM provides a rich set of solutions designed to help new mainframe programmers
Tech Showcase: IBM X-Force report reveals challenges and strategies to succeed in the new computing environment
Tech Corner: New IBM z13 chip improves throughput and analytics performance
Solutions: ReACT V4.0; Ivory Service Architect V4.6
Stop Run: Running and fencing keep IBMer active
Reference Point - Global Events, Education, Resources for Mainframe
2015 Mainframe Solutions Edition Product Index
Linux on z E-book
IBM Systems Magazine, Mainframe - May/June 2015 - Intro
IBM Systems Magazine, Mainframe - May/June 2015 - Cover1
IBM Systems Magazine, Mainframe - May/June 2015 - Cover2
IBM Systems Magazine, Mainframe - May/June 2015 - 1
IBM Systems Magazine, Mainframe - May/June 2015 - Table of Contents
IBM Systems Magazine, Mainframe - May/June 2015 - 3
IBM Systems Magazine, Mainframe - May/June 2015 - 4
IBM Systems Magazine, Mainframe - May/June 2015 - IBM Perspective: A mainframe built for Generation Z
IBM Systems Magazine, Mainframe - May/June 2015 - Editor's Desk: Optimistic future
IBM Systems Magazine, Mainframe - May/June 2015 - 7
IBM Systems Magazine, Mainframe - May/June 2015 - Partner PoV: Now is the time for multifactor authentication
IBM Systems Magazine, Mainframe - May/June 2015 - 9
IBM Systems Magazine, Mainframe - May/June 2015 - Infographic: Myths, exaggerations and uncomfortable truths
IBM Systems Magazine, Mainframe - May/June 2015 - Currents: TCO for an IBM z13 cloud is lower than an x86 or public cloud, according to an IBM study
IBM Systems Magazine, Mainframe - May/June 2015 - 12
IBM Systems Magazine, Mainframe - May/June 2015 - 13
IBM Systems Magazine, Mainframe - May/June 2015 - 14
IBM Systems Magazine, Mainframe - May/June 2015 - 15
IBM Systems Magazine, Mainframe - May/June 2015 - R&D: IBM Research is working to better diagnose osteoporosis -- and make computing more economical
IBM Systems Magazine, Mainframe - May/June 2015 - 17
IBM Systems Magazine, Mainframe - May/June 2015 - 18
IBM Systems Magazine, Mainframe - May/June 2015 - 19
IBM Systems Magazine, Mainframe - May/June 2015 - Cover Story: Mastering the Mainframe: IBM contest connects millennials to the mainframe and potential employers
IBM Systems Magazine, Mainframe - May/June 2015 - 21
IBM Systems Magazine, Mainframe - May/June 2015 - 22
IBM Systems Magazine, Mainframe - May/June 2015 - 23
IBM Systems Magazine, Mainframe - May/June 2015 - Feature: The Millennial Career Guidebook: Six groups and resources to help mainframers starting their careers
IBM Systems Magazine, Mainframe - May/June 2015 - 25
IBM Systems Magazine, Mainframe - May/June 2015 - 26
IBM Systems Magazine, Mainframe - May/June 2015 - 27
IBM Systems Magazine, Mainframe - May/June 2015 - 28
IBM Systems Magazine, Mainframe - May/June 2015 - 29
IBM Systems Magazine, Mainframe - May/June 2015 - Feature: Mainframe Within Reach: IBM provides a rich set of solutions designed to help new mainframe programmers
IBM Systems Magazine, Mainframe - May/June 2015 - 31
IBM Systems Magazine, Mainframe - May/June 2015 - 32
IBM Systems Magazine, Mainframe - May/June 2015 - Tech Showcase: IBM X-Force report reveals challenges and strategies to succeed in the new computing environment
IBM Systems Magazine, Mainframe - May/June 2015 - 34
IBM Systems Magazine, Mainframe - May/June 2015 - 35
IBM Systems Magazine, Mainframe - May/June 2015 - 36
IBM Systems Magazine, Mainframe - May/June 2015 - 37
IBM Systems Magazine, Mainframe - May/June 2015 - 38
IBM Systems Magazine, Mainframe - May/June 2015 - 39
IBM Systems Magazine, Mainframe - May/June 2015 - 40
IBM Systems Magazine, Mainframe - May/June 2015 - 41
IBM Systems Magazine, Mainframe - May/June 2015 - Tech Corner: New IBM z13 chip improves throughput and analytics performance
IBM Systems Magazine, Mainframe - May/June 2015 - 43
IBM Systems Magazine, Mainframe - May/June 2015 - 44
IBM Systems Magazine, Mainframe - May/June 2015 - 45
IBM Systems Magazine, Mainframe - May/June 2015 - 46
IBM Systems Magazine, Mainframe - May/June 2015 - Solutions: ReACT V4.0; Ivory Service Architect V4.6
IBM Systems Magazine, Mainframe - May/June 2015 - Stop Run: Running and fencing keep IBMer active
IBM Systems Magazine, Mainframe - May/June 2015 - Cover3
IBM Systems Magazine, Mainframe - May/June 2015 - Cover4
IBM Systems Magazine, Mainframe - May/June 2015 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - May/June 2015 - RF2
IBM Systems Magazine, Mainframe - May/June 2015 - Linux on z E-book
IBM Systems Magazine, Mainframe - May/June 2015 - L2
IBM Systems Magazine, Mainframe - May/June 2015 - L3
IBM Systems Magazine, Mainframe - May/June 2015 - L4
IBM Systems Magazine, Mainframe - May/June 2015 - L5
IBM Systems Magazine, Mainframe - May/June 2015 - L6
IBM Systems Magazine, Mainframe - May/June 2015 - L7
IBM Systems Magazine, Mainframe - May/June 2015 - L8
IBM Systems Magazine, Mainframe - May/June 2015 - L9
IBM Systems Magazine, Mainframe - May/June 2015 - L10
IBM Systems Magazine, Mainframe - May/June 2015 - L11
IBM Systems Magazine, Mainframe - May/June 2015 - L12
IBM Systems Magazine, Mainframe - May/June 2015 - L13
IBM Systems Magazine, Mainframe - May/June 2015 - L14
IBM Systems Magazine, Mainframe - May/June 2015 - L15
IBM Systems Magazine, Mainframe - May/June 2015 - L16
IBM Systems Magazine, Mainframe - May/June 2015 - L17
IBM Systems Magazine, Mainframe - May/June 2015 - L18
IBM Systems Magazine, Mainframe - May/June 2015 - L19
IBM Systems Magazine, Mainframe - May/June 2015 - L20
IBM Systems Magazine, Mainframe - May/June 2015 - L21
IBM Systems Magazine, Mainframe - May/June 2015 - 2015 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - May/June 2015 - SE2
IBM Systems Magazine, Mainframe - May/June 2015 - SE3
IBM Systems Magazine, Mainframe - May/June 2015 - SE4
IBM Systems Magazine, Mainframe - May/June 2015 - SE5
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com