IBM Systems Magazine, Mainframe - May/June 2016 - 33

TECH SHOWCASE
SPONSORED ADVERTISING CONTENT

Security Breaches
Have Become
Commonplace
"You have all of this information coming
in-millions of records-and somewhere
in those records could be information
pointing to a malicious attack. How do
you find that one needle in the haystack?"
-Jason Hardy, market segment manager, IBM Mobile Security

from forwarding attachments
from corporate email systems.
It's also easier to enforce
authentication of the device and
stop data loss and leaks.

Boost App Security
According to Statista
(bit.ly/1oNiPaL), as of July 2015,
Android users could download

1.6 million apps in the leading
app stores. At the same time,
Apple's store offered 1.5 million
apps for download.
It's nearly impossible to tell
how all of those applications were
developed. And, unfortunately,
app breaches are one of the
most common methods of
hacking into a mobile device.

Lower the Risk
To lower the risk of information from lost and stolen devices
getting into the wrong hands, the e-guide "Mobilephobia:
Curing the CISO's Most Common Mobile Security Fears"
provides some tips. The process should include these
common elements:

Recent mega breaches and growing
compliance and audit demands
have increased the need to control
and manage the credentials and
activities of privileged users who
have unfettered access to highvalue systems that store and process
sensitive information.
Even as organizations work
diligently to improve their
cybersecurity threat postures,
cybercriminals continue to develop
PRUHÃLQWULFDWHÃPHWKRGVÃWRÃLQÀÃOWUDWHÃ
critical infrastructure. 2015 was a
banner year in terms of the multitude
of tactics used to break through
increasingly stronger defenses.
Given these ever more sophisticated
means of intrusion, organizations must
implement innovative solutions to
minimize their risk and ensure security
due diligence.
The best way to secure your
enterprise is to implement security
administration, vulnerability
analysis, policy enforcement,
authentication (multifactor and
tokenless), intrusion detection, system
auditing, compliance reporting and
FRQÀJXUDWLRQÃPDQDJHPHQW
The cost of security and
FRPSOLDQFHÃLQÃHIIRUWVÃWRÃDYRLGÃÀÃQHVÃ
and penalties will help mitigate the
ULVNÃRIÃÀÃQDQFLDOÃH[SHQVHVÃUHODWHGÃWRÃDÃ
future breach.

Encrypt the device: This may seem obvious, but many
bring-your-own devices are not encrypted. The enrollment
process must include encryption.
Separate personal and corporate information: The
idea of containerizing, sandboxing or otherwise drawing a
logical distinction between the two "personalities" provides
greater protection.
No enrollment/no access: The key is not to position
the mobile security management tools as the traffic cops
between users and information but to make the enrollment
process unobtrusive and simple so it happens even when
users aren't forced to run scripts or download software.
Develop an "information architecture": Know
what information must be protected at all costs and
what information is less sensitive.

Brian Caskey
CMO,
Vanguard Integrity Professionals
Brian Caskey has a 25-year track
record in global marketing, corporate
strategy, business development and
global branding.

MAY/JUNE 2016 // 33


http://www.bit.ly/1oNiPaL

IBM Systems Magazine, Mainframe - May/June 2016

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - May/June 2016

Table of Contents
Editor's Desk: Flexible and agile environment
IBM Perspective: Elevating open source for the enterprise
Partner PoV: New information about threats in the z/OS system improves performance
The new IBM z13 can consolidate Linux workloads at a lower cost
Focus on Storage: IBM Spectrum Storage Suite offers a new way of licensing storage software
Cover Story: Achieving An Advantage: Linux on z Systems enables the API economy and microservices while enhancing hybrid cloud solutions
Feature: A Better Option: Businesses see an advantage to using Linux on z Systems over scale-out servers
Tech Showcase: CISOs can mitigate mobile security fears and prevent issues in the workplace
Tech Corner: IBM DB2 on z/OS V2.2 features space and storage ehancements
Administrator: IBM Multi-Factor Authentication fo z/OS helps maintain a secure infrastructure
Solutions: Universal Data Manager; OpenLegacy V3.0
Stop Run: 19-year-old mainframe enthusiast installs a z890 in his parents' basement
Reference Point - Global Events, Education, Resources for Mainframe
2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - May/June 2016 - Intro
IBM Systems Magazine, Mainframe - May/June 2016 - Cover1
IBM Systems Magazine, Mainframe - May/June 2016 - Cover2
IBM Systems Magazine, Mainframe - May/June 2016 - 1
IBM Systems Magazine, Mainframe - May/June 2016 - Table of Contents
IBM Systems Magazine, Mainframe - May/June 2016 - 3
IBM Systems Magazine, Mainframe - May/June 2016 - 4
IBM Systems Magazine, Mainframe - May/June 2016 - 5
IBM Systems Magazine, Mainframe - May/June 2016 - Editor's Desk: Flexible and agile environment
IBM Systems Magazine, Mainframe - May/June 2016 - 7
IBM Systems Magazine, Mainframe - May/June 2016 - IBM Perspective: Elevating open source for the enterprise
IBM Systems Magazine, Mainframe - May/June 2016 - Partner PoV: New information about threats in the z/OS system improves performance
IBM Systems Magazine, Mainframe - May/June 2016 - 10
IBM Systems Magazine, Mainframe - May/June 2016 - The new IBM z13 can consolidate Linux workloads at a lower cost
IBM Systems Magazine, Mainframe - May/June 2016 - 12
IBM Systems Magazine, Mainframe - May/June 2016 - 13
IBM Systems Magazine, Mainframe - May/June 2016 - 14
IBM Systems Magazine, Mainframe - May/June 2016 - Focus on Storage: IBM Spectrum Storage Suite offers a new way of licensing storage software
IBM Systems Magazine, Mainframe - May/June 2016 - 16
IBM Systems Magazine, Mainframe - May/June 2016 - 17
IBM Systems Magazine, Mainframe - May/June 2016 - Cover Story: Achieving An Advantage: Linux on z Systems enables the API economy and microservices while enhancing hybrid cloud solutions
IBM Systems Magazine, Mainframe - May/June 2016 - 19
IBM Systems Magazine, Mainframe - May/June 2016 - 20
IBM Systems Magazine, Mainframe - May/June 2016 - 21
IBM Systems Magazine, Mainframe - May/June 2016 - Feature: A Better Option: Businesses see an advantage to using Linux on z Systems over scale-out servers
IBM Systems Magazine, Mainframe - May/June 2016 - 23
IBM Systems Magazine, Mainframe - May/June 2016 - 24
IBM Systems Magazine, Mainframe - May/June 2016 - 25
IBM Systems Magazine, Mainframe - May/June 2016 - 26
IBM Systems Magazine, Mainframe - May/June 2016 - Tech Showcase: CISOs can mitigate mobile security fears and prevent issues in the workplace
IBM Systems Magazine, Mainframe - May/June 2016 - 28
IBM Systems Magazine, Mainframe - May/June 2016 - 29
IBM Systems Magazine, Mainframe - May/June 2016 - 30
IBM Systems Magazine, Mainframe - May/June 2016 - 31
IBM Systems Magazine, Mainframe - May/June 2016 - 32
IBM Systems Magazine, Mainframe - May/June 2016 - 33
IBM Systems Magazine, Mainframe - May/June 2016 - 34
IBM Systems Magazine, Mainframe - May/June 2016 - 35
IBM Systems Magazine, Mainframe - May/June 2016 - 36
IBM Systems Magazine, Mainframe - May/June 2016 - 37
IBM Systems Magazine, Mainframe - May/June 2016 - 38
IBM Systems Magazine, Mainframe - May/June 2016 - 39
IBM Systems Magazine, Mainframe - May/June 2016 - Tech Corner: IBM DB2 on z/OS V2.2 features space and storage ehancements
IBM Systems Magazine, Mainframe - May/June 2016 - 41
IBM Systems Magazine, Mainframe - May/June 2016 - 42
IBM Systems Magazine, Mainframe - May/June 2016 - 43
IBM Systems Magazine, Mainframe - May/June 2016 - Administrator: IBM Multi-Factor Authentication fo z/OS helps maintain a secure infrastructure
IBM Systems Magazine, Mainframe - May/June 2016 - 45
IBM Systems Magazine, Mainframe - May/June 2016 - 46
IBM Systems Magazine, Mainframe - May/June 2016 - Solutions: Universal Data Manager; OpenLegacy V3.0
IBM Systems Magazine, Mainframe - May/June 2016 - Stop Run: 19-year-old mainframe enthusiast installs a z890 in his parents' basement
IBM Systems Magazine, Mainframe - May/June 2016 - Cover3
IBM Systems Magazine, Mainframe - May/June 2016 - Cover4
IBM Systems Magazine, Mainframe - May/June 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - May/June 2016 - 2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - May/June 2016 - SE2
IBM Systems Magazine, Mainframe - May/June 2016 - SE3
IBM Systems Magazine, Mainframe - May/June 2016 - SE4
IBM Systems Magazine, Mainframe - May/June 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200910
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com