IBM Systems Magazine, Mainframe - September/October 2016 - 36

MAINFRAME SECURITY SURVEY from outside threats. Monitoring cloud security infrastructure was a concern for 57.2 percent. Others included maintaining regulatory compliance (48.8 percent), monitoring workloads across multiple cloud infrastructures (34.7 percent) and monitoring cloud-based network data traffic patterns (29.4 percent). See the results in Figure 3 on page 38. "One of the things people are doing to mitigate risk is leveraging hybrid clouds," Sardino says. "They may have application components in this environment or use software as a service that connects securely back to the system of record. This allows you to have a layered approach to security with sensitive data residing on the mainframe and other, less sensitive data and applications on the cloud." According to Shay, mainframe cloud is generally just as secure as non-cloud, mainframebased resources. Cloud-based mainframe data typically resides in a secure data center, leaving the data center on secure lines or a VPN, much as non-cloud data runs through secure networks within home data centers. As far as he's concerned, "security concerns for mainframe clouds are exactly the same as non-cloud implementations." Removing Barriers Many organizations have similar concerns about mobile Figure 2: Which one of the following best describes your company's industry? computing. Among their reservations, according to the survey, are data privacy (74.9 percent), access control (64.2 percent), mobile device loss or theft (50.7 percent), third-party mobile apps (43.1 percent) and compliance (32.7 percent). "It would just kill me if I lost my phone and all of the personal data I have on it was misused, but that's just the tip of the iceberg," King notes. "Take a car rental agency, for example. It might use tablets in the field when checking cars in and out, and those devices likely have access to a lot of back-end data, such as personal customer data and credit card numbers. If someone gets ahold of those devices, he can do more damage than you know." "You can't just get a certificate and automatically call yourself an expert. It takes years and years of experience to get to that level." -Stan King, CTO, Information Technology Co. 36 // SEPTEMBER/OCTOBER 2016 ibmsystemsmag.com Shay sees mobile devices as just another method to access the mainframe. Already, capabilities exist to provide secure access for authorized users with a smartphone or tablet. "You just need to do your homework," he adds. Encryption is one way to address concerns regarding both cloud and mobile. The majority of survey respondents report having some type of encryption in place, for a total of 71.4 percent (33.6 percent symmetric and 37.8 percent asymmetric). However, 28.7 percent have no encryption technologies in place. This is a startling number, given the built-in encryption capabilities of z Systems, both at the hardware and z/OS* levels. Part of this could be due to perceived complexities or uncertainty about what to encrypt. The general consensus regarding the latter is to perform an inventory of what's most sensitive and encrypt that, both at rest and when it's in motion. In some cases, organizations are concerned they might have to rewrite applications to allow for encryption. Some tools-such as http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - September/October 2016

Table of Contents
Editor's Desk: Mitigating money matters
IBM Perspective: Linux on z Systems provides financial industry a foundation for blockchain
Partner PoV: Virtualization helps improve time to market and data center operations
IT Today: Blockchain's potential extends beyond the financial industry
Case Study: The Right Tools: Educational Testing Service streamlines application calls and improves PCI compliance
Cover Story: Process Transformation: Blockchain brings speed, security and transparency to business
Feature: A Modern System: IBM midtier solutions exploit API and microservices to drive innovation
Special Report: Mainframe Security Survey: Unauthorized users and external hackers are top concerns cited in survey
Tech Corner: Create a DevOps pipeline for Java applications in CICS
Solutions: zVT Control Center, dbDefender DAM Agent for DB2
Stop Run: IBM software engineer balances his day job with acting
Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - September/October 2016 - Intro
IBM Systems Magazine, Mainframe - September/October 2016 - Cover1
IBM Systems Magazine, Mainframe - September/October 2016 - Cover2
IBM Systems Magazine, Mainframe - September/October 2016 - 1
IBM Systems Magazine, Mainframe - September/October 2016 - Table of Contents
IBM Systems Magazine, Mainframe - September/October 2016 - 3
IBM Systems Magazine, Mainframe - September/October 2016 - 4
IBM Systems Magazine, Mainframe - September/October 2016 - 5
IBM Systems Magazine, Mainframe - September/October 2016 - Editor's Desk: Mitigating money matters
IBM Systems Magazine, Mainframe - September/October 2016 - 7
IBM Systems Magazine, Mainframe - September/October 2016 - IBM Perspective: Linux on z Systems provides financial industry a foundation for blockchain
IBM Systems Magazine, Mainframe - September/October 2016 - 9
IBM Systems Magazine, Mainframe - September/October 2016 - Partner PoV: Virtualization helps improve time to market and data center operations
IBM Systems Magazine, Mainframe - September/October 2016 - 11
IBM Systems Magazine, Mainframe - September/October 2016 - 12
IBM Systems Magazine, Mainframe - September/October 2016 - IT Today: Blockchain's potential extends beyond the financial industry
IBM Systems Magazine, Mainframe - September/October 2016 - 14
IBM Systems Magazine, Mainframe - September/October 2016 - 15
IBM Systems Magazine, Mainframe - September/October 2016 - Case Study: The Right Tools: Educational Testing Service streamlines application calls and improves PCI compliance
IBM Systems Magazine, Mainframe - September/October 2016 - 17
IBM Systems Magazine, Mainframe - September/October 2016 - 18
IBM Systems Magazine, Mainframe - September/October 2016 - 19
IBM Systems Magazine, Mainframe - September/October 2016 - Cover Story: Process Transformation: Blockchain brings speed, security and transparency to business
IBM Systems Magazine, Mainframe - September/October 2016 - 21
IBM Systems Magazine, Mainframe - September/October 2016 - 22
IBM Systems Magazine, Mainframe - September/October 2016 - 23
IBM Systems Magazine, Mainframe - September/October 2016 - 24
IBM Systems Magazine, Mainframe - September/October 2016 - 25
IBM Systems Magazine, Mainframe - September/October 2016 - Feature: A Modern System: IBM midtier solutions exploit API and microservices to drive innovation
IBM Systems Magazine, Mainframe - September/October 2016 - 27
IBM Systems Magazine, Mainframe - September/October 2016 - 28
IBM Systems Magazine, Mainframe - September/October 2016 - 29
IBM Systems Magazine, Mainframe - September/October 2016 - 30
IBM Systems Magazine, Mainframe - September/October 2016 - Special Report: Mainframe Security Survey: Unauthorized users and external hackers are top concerns cited in survey
IBM Systems Magazine, Mainframe - September/October 2016 - 32
IBM Systems Magazine, Mainframe - September/October 2016 - 33
IBM Systems Magazine, Mainframe - September/October 2016 - 34
IBM Systems Magazine, Mainframe - September/October 2016 - 35
IBM Systems Magazine, Mainframe - September/October 2016 - 36
IBM Systems Magazine, Mainframe - September/October 2016 - 37
IBM Systems Magazine, Mainframe - September/October 2016 - 38
IBM Systems Magazine, Mainframe - September/October 2016 - 39
IBM Systems Magazine, Mainframe - September/October 2016 - 40
IBM Systems Magazine, Mainframe - September/October 2016 - 41
IBM Systems Magazine, Mainframe - September/October 2016 - Tech Corner: Create a DevOps pipeline for Java applications in CICS
IBM Systems Magazine, Mainframe - September/October 2016 - 43
IBM Systems Magazine, Mainframe - September/October 2016 - 44
IBM Systems Magazine, Mainframe - September/October 2016 - 45
IBM Systems Magazine, Mainframe - September/October 2016 - Solutions: zVT Control Center, dbDefender DAM Agent for DB2
IBM Systems Magazine, Mainframe - September/October 2016 - 47
IBM Systems Magazine, Mainframe - September/October 2016 - Stop Run: IBM software engineer balances his day job with acting
IBM Systems Magazine, Mainframe - September/October 2016 - Cover3
IBM Systems Magazine, Mainframe - September/October 2016 - Cover4
IBM Systems Magazine, Mainframe - September/October 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - September/October 2016 - SE1
IBM Systems Magazine, Mainframe - September/October 2016 - SE2
IBM Systems Magazine, Mainframe - September/October 2016 - SE3
IBM Systems Magazine, Mainframe - September/October 2016 - SE4
IBM Systems Magazine, Mainframe - September/October 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com