IBM Systems Magazine, Mainframe - July/August 2015 - 26

community. Young says speaking
at security conferences legitimizes
what mainframers have been
trying to do.
"They have been trying to tell
people, 'You need to think about
security on this platform' and
they really did not have a tool to
say, 'Now this is why,' " Young
remarks. "Despite the risks, no one
really was that concerned until I
started talking about it outside of
the mainframe sphere. I started
talking to other security people
and that got people's awareness."
Young recalls a situation he
saw almost a decade ago at his
then-employer: "There were
security concerns by a system
programmer. She gave them to
me and I tried to raise it up to
the information security team.
They were like, 'We do not care.
We have other things that we are
dealing with, other audit issues.' "
Young attributes this to many
managers being told when they
started a decade or so ago that the
mainframe was not the system
of choice; therefore, they were
educated in different systems and
didn't spend time and resources
securing a platform that they were
told wouldn't be around.
Now, Young notes that he sees
more interest and activity in

REVIEW
TYPES
PENETRATION
TEST
A method of
evaluating the
security of a Web
application by
simulating an
attack
VULNERABILITY
SCAN
An automated,
scheduled scan
looking for a
security exposure
in an OS, system
software or
application
software
component

learning about security issues as
people are asking him for help
and advice. He's engaged in
online conversations, and more
people are talking and doing
research in the security space.
Although information security
is 10 or 15 years old as a practice,
Young says it's fairly immature
as a concept and enterprises are
still getting a feel for what needs
to be done. He has, however,
noticed a change in the high-level
view of security. "I think there's
been an awakening at the seniormanagement level."
Executives are asking why
the platform is being treated
differently from other platforms,
about the skill set needed to
secure the platform and about
what can be done to get people
skilled, according to Young.
Huge enterprise security
programs with logging and
monitoring are available for
Windows* and Linux* platforms
but the maturity that exists on
those platforms is not on the
mainframe, Young points out. He
maintains the mainframe should
have the same level of security
precautions. "If anything, it should
have more scrutiny because it is so
critical to your enterprise than the
other platforms," he adds.

Learn More
Philip Young's blog about mainframe security and relevant article links:
mainframed767.tumblr.com
IBM security solutions and resources, videos and case studies:
ibm.com/systems/z/solutions/security.html
IBM X-Force Exchange cyberthreat intelligence sharing platform:
exchange.xforce.ibmcloud.com

26 // JULY/AUGUST 2015 ibmsystemsmag.com

He also asserts that enterprises
need to be aware of mainframe
security. (Read tips in "Security
Process," page 24.) The key is
proper configuration, Young
cautions, adding that if security
testing is not happening, a
company won't know it is
configured properly.
Through his early work
performing mainframe audits,
Young has observed organizations
that were compliant with
the policies and procedures
that existed, but the policies
weren't well designed from a
security perspective. "Security
by compliance is not security,"
Young stresses.

The Highest Security
IBM z Systems* servers are
designed for the highest level of
security for commercial platforms.
The new IBM z13* server is no
exception, reaching Common
Criteria Evaluation Assurance
Level 5+ certification. Security
on the mainframe goes through
the System Authorization Facility
component, which routes
requests to an external security
product like RACF. The new z13
mainframe features the Crypto
Express5S, a cryptographic
coprocessor for security of
transactions and data.
While Young agrees the IBM
mainframe is the most securable
platform, introducing third-party
software could require security
settings to be lowered, allowing
access to people or for products to
work together that have different
integrity statements. This creates
what he calls a trade-off between
security and functionality.
To ensure the best security for
the customer's mainframe, Young


http://mainframed767.tumblr.com http://www.ibm.com/systems/z/solutions/security.html http://exchange.xforce.ibmcloud.com http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - July/August 2015

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2015

Table of Contents
Editor's Desk: An important note
IBM Perspective: Transforming travel end to end
Partner PoV: Maximize the platform's business value by addressing challenges now
IT Today: Infrastructure matters: Myth or truth?
Case Study: Turning Complexity Into Simplicity: Vissensa Ltd. deploys an IBM Enterprise Cloud System to relieve the IT burdens of its clients
Cover Story: Industry Importance: Applying disruptive technologies in a nondisrputive way helps mainframe clients achieve business efficiency
Feature: Security Notification: Mainframe companies must be proactive and educated in testing and protection, expert says
Feature: Industry Improvements: Clients from five key industries highlight what's possible with IBM mainframe
Tech Showcase: Businesses must look at the big picture to take advantage of analytics
HotTECH Products
Administrator: New technologies with the IBM z13 and DS8870 systems aim to reduce costs and improve resilience, scale and performance
Solutions: ARCAD- Anonymizer; FDRPASVM, MVT Vault, STEPLIB-Rx 3.1; Topaz, ISPW V4.4, Savvytest 2.1
Stop Run: 'Things just clicked' for IBMer looking for his path
Reference Point - Global Events, Education, Resources for Mainframe
2015 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2015 - Intro
IBM Systems Magazine, Mainframe - July/August 2015 - Cover1
IBM Systems Magazine, Mainframe - July/August 2015 - Cover2
IBM Systems Magazine, Mainframe - July/August 2015 - 1
IBM Systems Magazine, Mainframe - July/August 2015 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2015 - 3
IBM Systems Magazine, Mainframe - July/August 2015 - 4
IBM Systems Magazine, Mainframe - July/August 2015 - 5
IBM Systems Magazine, Mainframe - July/August 2015 - Editor's Desk: An important note
IBM Systems Magazine, Mainframe - July/August 2015 - 7
IBM Systems Magazine, Mainframe - July/August 2015 - IBM Perspective: Transforming travel end to end
IBM Systems Magazine, Mainframe - July/August 2015 - 9
IBM Systems Magazine, Mainframe - July/August 2015 - Partner PoV: Maximize the platform's business value by addressing challenges now
IBM Systems Magazine, Mainframe - July/August 2015 - 11
IBM Systems Magazine, Mainframe - July/August 2015 - IT Today: Infrastructure matters: Myth or truth?
IBM Systems Magazine, Mainframe - July/August 2015 - 13
IBM Systems Magazine, Mainframe - July/August 2015 - Case Study: Turning Complexity Into Simplicity: Vissensa Ltd. deploys an IBM Enterprise Cloud System to relieve the IT burdens of its clients
IBM Systems Magazine, Mainframe - July/August 2015 - 15
IBM Systems Magazine, Mainframe - July/August 2015 - 16
IBM Systems Magazine, Mainframe - July/August 2015 - 17
IBM Systems Magazine, Mainframe - July/August 2015 - Cover Story: Industry Importance: Applying disruptive technologies in a nondisrputive way helps mainframe clients achieve business efficiency
IBM Systems Magazine, Mainframe - July/August 2015 - 19
IBM Systems Magazine, Mainframe - July/August 2015 - 20
IBM Systems Magazine, Mainframe - July/August 2015 - 21
IBM Systems Magazine, Mainframe - July/August 2015 - Feature: Security Notification: Mainframe companies must be proactive and educated in testing and protection, expert says
IBM Systems Magazine, Mainframe - July/August 2015 - 23
IBM Systems Magazine, Mainframe - July/August 2015 - 24
IBM Systems Magazine, Mainframe - July/August 2015 - 25
IBM Systems Magazine, Mainframe - July/August 2015 - 26
IBM Systems Magazine, Mainframe - July/August 2015 - 27
IBM Systems Magazine, Mainframe - July/August 2015 - Feature: Industry Improvements: Clients from five key industries highlight what's possible with IBM mainframe
IBM Systems Magazine, Mainframe - July/August 2015 - 29
IBM Systems Magazine, Mainframe - July/August 2015 - 30
IBM Systems Magazine, Mainframe - July/August 2015 - 31
IBM Systems Magazine, Mainframe - July/August 2015 - 32
IBM Systems Magazine, Mainframe - July/August 2015 - Tech Showcase: Businesses must look at the big picture to take advantage of analytics
IBM Systems Magazine, Mainframe - July/August 2015 - 34
IBM Systems Magazine, Mainframe - July/August 2015 - 35
IBM Systems Magazine, Mainframe - July/August 2015 - 36
IBM Systems Magazine, Mainframe - July/August 2015 - HotTECH Products
IBM Systems Magazine, Mainframe - July/August 2015 - 38
IBM Systems Magazine, Mainframe - July/August 2015 - 39
IBM Systems Magazine, Mainframe - July/August 2015 - 40
IBM Systems Magazine, Mainframe - July/August 2015 - Administrator: New technologies with the IBM z13 and DS8870 systems aim to reduce costs and improve resilience, scale and performance
IBM Systems Magazine, Mainframe - July/August 2015 - 42
IBM Systems Magazine, Mainframe - July/August 2015 - 43
IBM Systems Magazine, Mainframe - July/August 2015 - 44
IBM Systems Magazine, Mainframe - July/August 2015 - Solutions: ARCAD- Anonymizer; FDRPASVM, MVT Vault, STEPLIB-Rx 3.1; Topaz, ISPW V4.4, Savvytest 2.1
IBM Systems Magazine, Mainframe - July/August 2015 - 46
IBM Systems Magazine, Mainframe - July/August 2015 - 47
IBM Systems Magazine, Mainframe - July/August 2015 - Stop Run: 'Things just clicked' for IBMer looking for his path
IBM Systems Magazine, Mainframe - July/August 2015 - Cover3
IBM Systems Magazine, Mainframe - July/August 2015 - Cover4
IBM Systems Magazine, Mainframe - July/August 2015 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2015 - 2015 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2015 - SE2
IBM Systems Magazine, Mainframe - July/August 2015 - SE3
IBM Systems Magazine, Mainframe - July/August 2015 - SE4
IBM Systems Magazine, Mainframe - July/August 2015 - SE5
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com