IBM Systems Magazine, Mainframe - July/August 2016 - 30

"more like thrill-seekers or social
activists," notes Kat Lind, SIL's
chief research analyst, who
headed the group that produced
the report. Those hackers still
exist, of course, and remain
troublesome, but the mayhem
they cause is more akin to that
perpetrated by vandals or graffiti
taggers. Today's cybercriminals
are thieves and pillagers. Some
even have the backing of their
home governments. "You have
an increasing number of hackers
that is composed more of
cybercriminals these days than 15
years ago," Lind says.
Cybercriminals also have more
ways to breach an enterprise's
data vaults. "Integrated systems
are more vulnerable because
they're the sum of all different
types of controls, different
vendors, different programming,"
Lind says. Making security even
more challenging is the amount
of enterprise-related applications
compared to five years ago. The
number of applications available
as of Jan. 1, 2015, is 742.3x more
than the number available on
Jan. 1, 2011. More applications
provide the potential for more
open windows and doors for data
thieves to exploit.
The cloud is another source
of vulnerability. The hybrid

cloud is rightly becoming
the most popular new cloud
implementation option. Still,
it also requires that multiple
platform architectures be secured.
"The underlying cloud security
framework is dependent not
only on the principal platform
in the operating system," Lind
notes. "It also includes the
virtualization technology that's
incorporated into a particular
cloud deployment."
All of these factors, along with
the sheer interconnectedness
of the internet's servers and
applications, make cyberspace a
great breeding ground for crime,
Lind points out. Those criminals
can come from anywhere in the
world, and they know the online
caves and coves where they can
hide and lurk.
While many of these
cyberthieves are looking for what
Lind calls the low-hanging fruit of
an individual's personal financial
data, the most dangerous pirates
crave more lucrative booty,
notably corporate banking data
and intellectual property (IP)
information. IP hackers, Lind
adds, aren't only spies after a
company's secrets. They're also
targeting the huge and lucrative
area of research. A case in point:
A pharmaceutical company may

30 // JULY/AUGUST 2016 ibmsystemsmag.com

D

The number of
enterprise-related
applications
available as of
Jan. 1, 2015, is

742.3x
more than the
number available
Jan. 1, 2011

have invested years of research
and millions of dollars into
developing a new medication. A
cyberthief who makes off with the
firm's patent application can file
the patent ahead of the company
that did all the work. The amount
of money lost in this scenario is
billions of dollars.
In some cases, thieves use the
purloined data for blackmail. A
hacker will lock up the victim's
data, holding it hostage until
the victimized company pays.
What Lind refers to as cybermafia
types are looking for specific
types of information or data,
typically targeting a particular
corporation. Some grab the
data and sell it. Others are
more comprehensive-vertically
integrated operations, if you
will-that steal the data for their
own use. In a handful of cases,
the hackers simply destroy it.
Companies are spending
billions to fight cybercrime, but
the current dangers are evolving
so quickly to take advantage of
any weak points in an enterprise's
IT system that it can seem
impossible to keep up.

Strong Performance
and Security
In putting together the report,
SIL gathered more than 23,000


http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2016

Table of Contents
Editor's Desk: Security from every angle
IBM Perspective: Creating a secure foundation for hybrid cloud
Techbits: 'W' is for 'Watson'
Partner PoV: Get everyone in your organization on board with DevOps
It Today: Use analytics to improve DevOps effectiveness
Trends: Analytics can be your best defense against corporate fraud
R&D: IBM's data privacy and consent management technology provides greater control
Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
Sponsored Advertising Content: HotTECH Products
Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
Solutions: SUPERMON for Tubes, zHISR 2.7
Stop Run: IBMer finds his balance with hiking and mountaineering
Reference Point - Global Events, Education, Resources for Mainframe
2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - Intro
IBM Systems Magazine, Mainframe - July/August 2016 - Cover1
IBM Systems Magazine, Mainframe - July/August 2016 - Cover2
IBM Systems Magazine, Mainframe - July/August 2016 - 1
IBM Systems Magazine, Mainframe - July/August 2016 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2016 - 3
IBM Systems Magazine, Mainframe - July/August 2016 - 4
IBM Systems Magazine, Mainframe - July/August 2016 - 5
IBM Systems Magazine, Mainframe - July/August 2016 - Editor's Desk: Security from every angle
IBM Systems Magazine, Mainframe - July/August 2016 - 7
IBM Systems Magazine, Mainframe - July/August 2016 - IBM Perspective: Creating a secure foundation for hybrid cloud
IBM Systems Magazine, Mainframe - July/August 2016 - 9
IBM Systems Magazine, Mainframe - July/August 2016 - Techbits: 'W' is for 'Watson'
IBM Systems Magazine, Mainframe - July/August 2016 - 11
IBM Systems Magazine, Mainframe - July/August 2016 - Partner PoV: Get everyone in your organization on board with DevOps
IBM Systems Magazine, Mainframe - July/August 2016 - 13
IBM Systems Magazine, Mainframe - July/August 2016 - It Today: Use analytics to improve DevOps effectiveness
IBM Systems Magazine, Mainframe - July/August 2016 - 15
IBM Systems Magazine, Mainframe - July/August 2016 - 16
IBM Systems Magazine, Mainframe - July/August 2016 - 17
IBM Systems Magazine, Mainframe - July/August 2016 - Trends: Analytics can be your best defense against corporate fraud
IBM Systems Magazine, Mainframe - July/August 2016 - 19
IBM Systems Magazine, Mainframe - July/August 2016 - R&D: IBM's data privacy and consent management technology provides greater control
IBM Systems Magazine, Mainframe - July/August 2016 - 21
IBM Systems Magazine, Mainframe - July/August 2016 - 22
IBM Systems Magazine, Mainframe - July/August 2016 - 23
IBM Systems Magazine, Mainframe - July/August 2016 - Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
IBM Systems Magazine, Mainframe - July/August 2016 - 25
IBM Systems Magazine, Mainframe - July/August 2016 - 26
IBM Systems Magazine, Mainframe - July/August 2016 - 27
IBM Systems Magazine, Mainframe - July/August 2016 - Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
IBM Systems Magazine, Mainframe - July/August 2016 - 29
IBM Systems Magazine, Mainframe - July/August 2016 - 30
IBM Systems Magazine, Mainframe - July/August 2016 - 31
IBM Systems Magazine, Mainframe - July/August 2016 - 32
IBM Systems Magazine, Mainframe - July/August 2016 - 33
IBM Systems Magazine, Mainframe - July/August 2016 - Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
IBM Systems Magazine, Mainframe - July/August 2016 - 35
IBM Systems Magazine, Mainframe - July/August 2016 - 36
IBM Systems Magazine, Mainframe - July/August 2016 - 37
IBM Systems Magazine, Mainframe - July/August 2016 - 38
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
IBM Systems Magazine, Mainframe - July/August 2016 - 40
IBM Systems Magazine, Mainframe - July/August 2016 - 41
IBM Systems Magazine, Mainframe - July/August 2016 - 42
IBM Systems Magazine, Mainframe - July/August 2016 - 43
IBM Systems Magazine, Mainframe - July/August 2016 - Sponsored Advertising Content: HotTECH Products
IBM Systems Magazine, Mainframe - July/August 2016 - 45
IBM Systems Magazine, Mainframe - July/August 2016 - 46
IBM Systems Magazine, Mainframe - July/August 2016 - 47
IBM Systems Magazine, Mainframe - July/August 2016 - 48
IBM Systems Magazine, Mainframe - July/August 2016 - 49
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
IBM Systems Magazine, Mainframe - July/August 2016 - 51
IBM Systems Magazine, Mainframe - July/August 2016 - 52
IBM Systems Magazine, Mainframe - July/August 2016 - 53
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
IBM Systems Magazine, Mainframe - July/August 2016 - 55
IBM Systems Magazine, Mainframe - July/August 2016 - 56
IBM Systems Magazine, Mainframe - July/August 2016 - 57
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
IBM Systems Magazine, Mainframe - July/August 2016 - 59
IBM Systems Magazine, Mainframe - July/August 2016 - 60
IBM Systems Magazine, Mainframe - July/August 2016 - 61
IBM Systems Magazine, Mainframe - July/August 2016 - 62
IBM Systems Magazine, Mainframe - July/August 2016 - Solutions: SUPERMON for Tubes, zHISR 2.7
IBM Systems Magazine, Mainframe - July/August 2016 - Stop Run: IBMer finds his balance with hiking and mountaineering
IBM Systems Magazine, Mainframe - July/August 2016 - Cover3
IBM Systems Magazine, Mainframe - July/August 2016 - Cover4
IBM Systems Magazine, Mainframe - July/August 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2016 - 2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - SE2
IBM Systems Magazine, Mainframe - July/August 2016 - SE3
IBM Systems Magazine, Mainframe - July/August 2016 - SE4
IBM Systems Magazine, Mainframe - July/August 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com