IBM Systems Magazine, Mainframe - July/August 2016 - 32

targeted security analyses the
firm had run in the last two years
as well as the cybersecurity data
gathered from nearly 4 million
organizations worldwide by
Global Security Watch. Lind
notes that the report doesn't
describe enterprise platforms'
engineering per se, but rather
focuses on performance
or behavior.
Among the elements of
performance the report
identifies is how well enterprise
applications are isolated and
protected. The report states
that this isolation capability
is one of the great strengths of
z Systems*. Additionally, the
platform's integrated stack
approach, which is different from
any other architecture, creates
a tight integration between the
applications, Lind says. Other
architectures, she adds, are
vulnerable at their connection
points (where the applications
talk to each other). "We have
no reports of hacking along
those interface lines for any
mainframe," she adds.
The report notes yet another
major security enhancement
recently introduced-IBM
Multi-Factor Authentication
(MFA) for z/OS*. Put simply,
MFA comprises three types of
authentication:
ĀÃ 6RPHWKLQJÃ\RXÃNQRZÃW\SLFDOO\Ã
a user ID or password
ĀÃ 6RPHWKLQJÃ\RXÃKDYHÃVXFKÃ
as a one-time password or
cryptographic key
ĀÃ 6RPHWKLQJÃ\RXÃDUHÃDÃFDWHJRU\Ã
of authentication that
includes fingerprints or other
biometric data

Passwords have proven to be
a weak form of authentication,
as cybercriminals can steal
password information more
easily. One unnervingly common
way thieves make off with
passwords is through phishing.
Disguising themselves as, say,
a person's bank, thieves will
request a password via email
from the unwitting recipient.
Once they've obtained it, they
can rifle through the phishing
victim's accounts.
With MFA, a password
is no longer sufficient for
accessing stored data. The MFA
solution uses a user ID and
RSA SecurID, which generates
either a hardware- or softwarebased token in place of a
password. IBM's MFA solution
is integrated tightly at the
OS level and with RACF*. In
addition, organizations can
utilize IBM Security Identity
Governance and Intelligence
to manage RACF's fine-grained
entitlements, ensuring that
separation of duties are
maintained and users aren't
over-credentialed.
Additional factors for
authentication are under
development. IBM has
announced a statement of
direction to support Common
Access Card and Personal
Identity Verification that are
commonly used to authenticate
in the public sector as well as to
introduce the IBM TouchToken,
an iPhone app that would
generate a time-based, one-time
password to access a company's
mainframe using digitized
fingerprints as part of the
authentication process.

32 // JULY/AUGUST 2016 ibmsystemsmag.com

Looking Out for Threats
The cost of implementing
security on the mainframe is
substantially less than on other
platforms, Lind confirms. This
is primarily because there's
more security built into IBM z,
thus requiring fewer bolt-ons
and the costs that go with them,
such as adding staff to handle
those extras.
Regarding staff: An enterprise
still needs the governance and
organizational procedures in
place. Without those, "your
platform can save you only
so much," Lind adds. And
with employees accessing
that platform via their mobile
devices, laptops, hybrid cloud
services and other potential open
windows data thieves can slip
through, security has moved from
a concern for just the security
department itself to a concern for
all managers and executives at
an organization.
In other words, an enterprise
must protect more digital entry
points from a diverse, relentless
and increasingly sophisticated
set of enemies. All told, Lind
believes z Systems provides
"a strong primary base level
of security for the ongoing
cyberwar." She adds that IBM z
"also has your back" and can
handle both old and new threats.
As SIL's report demonstrates,
the z Systems platform has
proven to offer the most
formidable protection against
those who seek to turn the
internet era into the new
Dark Ages.
Gene Rebeck is a freelance writer
based in Duluth, Minnesota.


http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2016

Table of Contents
Editor's Desk: Security from every angle
IBM Perspective: Creating a secure foundation for hybrid cloud
Techbits: 'W' is for 'Watson'
Partner PoV: Get everyone in your organization on board with DevOps
It Today: Use analytics to improve DevOps effectiveness
Trends: Analytics can be your best defense against corporate fraud
R&D: IBM's data privacy and consent management technology provides greater control
Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
Sponsored Advertising Content: HotTECH Products
Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
Solutions: SUPERMON for Tubes, zHISR 2.7
Stop Run: IBMer finds his balance with hiking and mountaineering
Reference Point - Global Events, Education, Resources for Mainframe
2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - Intro
IBM Systems Magazine, Mainframe - July/August 2016 - Cover1
IBM Systems Magazine, Mainframe - July/August 2016 - Cover2
IBM Systems Magazine, Mainframe - July/August 2016 - 1
IBM Systems Magazine, Mainframe - July/August 2016 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2016 - 3
IBM Systems Magazine, Mainframe - July/August 2016 - 4
IBM Systems Magazine, Mainframe - July/August 2016 - 5
IBM Systems Magazine, Mainframe - July/August 2016 - Editor's Desk: Security from every angle
IBM Systems Magazine, Mainframe - July/August 2016 - 7
IBM Systems Magazine, Mainframe - July/August 2016 - IBM Perspective: Creating a secure foundation for hybrid cloud
IBM Systems Magazine, Mainframe - July/August 2016 - 9
IBM Systems Magazine, Mainframe - July/August 2016 - Techbits: 'W' is for 'Watson'
IBM Systems Magazine, Mainframe - July/August 2016 - 11
IBM Systems Magazine, Mainframe - July/August 2016 - Partner PoV: Get everyone in your organization on board with DevOps
IBM Systems Magazine, Mainframe - July/August 2016 - 13
IBM Systems Magazine, Mainframe - July/August 2016 - It Today: Use analytics to improve DevOps effectiveness
IBM Systems Magazine, Mainframe - July/August 2016 - 15
IBM Systems Magazine, Mainframe - July/August 2016 - 16
IBM Systems Magazine, Mainframe - July/August 2016 - 17
IBM Systems Magazine, Mainframe - July/August 2016 - Trends: Analytics can be your best defense against corporate fraud
IBM Systems Magazine, Mainframe - July/August 2016 - 19
IBM Systems Magazine, Mainframe - July/August 2016 - R&D: IBM's data privacy and consent management technology provides greater control
IBM Systems Magazine, Mainframe - July/August 2016 - 21
IBM Systems Magazine, Mainframe - July/August 2016 - 22
IBM Systems Magazine, Mainframe - July/August 2016 - 23
IBM Systems Magazine, Mainframe - July/August 2016 - Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
IBM Systems Magazine, Mainframe - July/August 2016 - 25
IBM Systems Magazine, Mainframe - July/August 2016 - 26
IBM Systems Magazine, Mainframe - July/August 2016 - 27
IBM Systems Magazine, Mainframe - July/August 2016 - Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
IBM Systems Magazine, Mainframe - July/August 2016 - 29
IBM Systems Magazine, Mainframe - July/August 2016 - 30
IBM Systems Magazine, Mainframe - July/August 2016 - 31
IBM Systems Magazine, Mainframe - July/August 2016 - 32
IBM Systems Magazine, Mainframe - July/August 2016 - 33
IBM Systems Magazine, Mainframe - July/August 2016 - Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
IBM Systems Magazine, Mainframe - July/August 2016 - 35
IBM Systems Magazine, Mainframe - July/August 2016 - 36
IBM Systems Magazine, Mainframe - July/August 2016 - 37
IBM Systems Magazine, Mainframe - July/August 2016 - 38
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
IBM Systems Magazine, Mainframe - July/August 2016 - 40
IBM Systems Magazine, Mainframe - July/August 2016 - 41
IBM Systems Magazine, Mainframe - July/August 2016 - 42
IBM Systems Magazine, Mainframe - July/August 2016 - 43
IBM Systems Magazine, Mainframe - July/August 2016 - Sponsored Advertising Content: HotTECH Products
IBM Systems Magazine, Mainframe - July/August 2016 - 45
IBM Systems Magazine, Mainframe - July/August 2016 - 46
IBM Systems Magazine, Mainframe - July/August 2016 - 47
IBM Systems Magazine, Mainframe - July/August 2016 - 48
IBM Systems Magazine, Mainframe - July/August 2016 - 49
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
IBM Systems Magazine, Mainframe - July/August 2016 - 51
IBM Systems Magazine, Mainframe - July/August 2016 - 52
IBM Systems Magazine, Mainframe - July/August 2016 - 53
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
IBM Systems Magazine, Mainframe - July/August 2016 - 55
IBM Systems Magazine, Mainframe - July/August 2016 - 56
IBM Systems Magazine, Mainframe - July/August 2016 - 57
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
IBM Systems Magazine, Mainframe - July/August 2016 - 59
IBM Systems Magazine, Mainframe - July/August 2016 - 60
IBM Systems Magazine, Mainframe - July/August 2016 - 61
IBM Systems Magazine, Mainframe - July/August 2016 - 62
IBM Systems Magazine, Mainframe - July/August 2016 - Solutions: SUPERMON for Tubes, zHISR 2.7
IBM Systems Magazine, Mainframe - July/August 2016 - Stop Run: IBMer finds his balance with hiking and mountaineering
IBM Systems Magazine, Mainframe - July/August 2016 - Cover3
IBM Systems Magazine, Mainframe - July/August 2016 - Cover4
IBM Systems Magazine, Mainframe - July/August 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2016 - 2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - SE2
IBM Systems Magazine, Mainframe - July/August 2016 - SE3
IBM Systems Magazine, Mainframe - July/August 2016 - SE4
IBM Systems Magazine, Mainframe - July/August 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com