IBM Systems Magazine, Mainframe - September/October 2016 - 38

MAINFRAME SECURITY SURVEY IBM Security Guardium* Data Encryption-alleviate that issue, allowing users to encrypt IBM DB2* and IMS* data without altering applications. "We have been encouraging customers to encrypt sensitive data as much as they can, and our strategy is to make it simple to help remove barriers for wider-spread adoption," Sardino says. "That way, clients can implement encryption pervasively across the enterprise, whether it's on disk, on the network, in the database or in applications. It's a layered approach to helping protect sensitive data." Diving Deep Many organizations have already taken steps to identify potential risk factors: authorized and unauthorized users, external hackers, unprotected downloads, phishing, software hooks (trapdoors) and malware. As Desu simply puts it: "Awareness drives security." When asked if they believed the need for IBM mainframe security skills is increasing as IT professionals familiar with the platform retire or prepare to retire in the near future, a whopping 84.9 percent of survey respondents said yes. In clear recognition of this, 52.7 percent of respondents said increased education on current, in-place security software, strategy and policies would help address security-related issues at their organizations (see Figure 4, page 40). "We have initiatives where we're teaching the next generation of mainframe skills," Sardino says. "But security requires a special type of person: someone who's willing to roll up Figure 3: What do you consider to be the greatest cloud computing security threats? their sleeves and dive into the arcane minutia involved in this. That said, simply educating your workforce on proper security policies, such as not writing their passwords on sticky notes and putting them under their keyboards, goes a long way." More comprehensively, organizations can replace some of the manual labor involved in spotting and reacting to potential intrusions by turning to advanced analytics and cognitive systems. Tools such as IBM Watson* for Cyber Security actively learn from experience as well as threat-analysis documentation-including blogs and threat feeds-to, in real time, recognize suspicious access activity and notify security analysts of those potential threats. 38 // SEPTEMBER/OCTOBER 2016 ibmsystemsmag.com For example, these analytical/ cognitive tools can use non-rulesbased behavioral assessments to discover if someone is trying to break into someone else's account. The key to this is behavioral analysis based on historically normal activity. These types of cognitive systems can act and gather pertinent security information faster than human analysts-and present alerts and threat data to them in natural language. This can help ameliorate concerns surrounding the lack of security specialists currently in the marketplace. "You can't just get a certificate and automatically call yourself an expert. It takes years and years of experience to get to that level," King remarks. "We have been encouraging customers to encrypt sensitive data as much as they can, and our strategy is to make it simple to help remove barriers for wider-spread adoption." -Nick Sardino, security offering manager, IBM z Systems http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - September/October 2016

Table of Contents
Editor's Desk: Mitigating money matters
IBM Perspective: Linux on z Systems provides financial industry a foundation for blockchain
Partner PoV: Virtualization helps improve time to market and data center operations
IT Today: Blockchain's potential extends beyond the financial industry
Case Study: The Right Tools: Educational Testing Service streamlines application calls and improves PCI compliance
Cover Story: Process Transformation: Blockchain brings speed, security and transparency to business
Feature: A Modern System: IBM midtier solutions exploit API and microservices to drive innovation
Special Report: Mainframe Security Survey: Unauthorized users and external hackers are top concerns cited in survey
Tech Corner: Create a DevOps pipeline for Java applications in CICS
Solutions: zVT Control Center, dbDefender DAM Agent for DB2
Stop Run: IBM software engineer balances his day job with acting
Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - September/October 2016 - Intro
IBM Systems Magazine, Mainframe - September/October 2016 - Cover1
IBM Systems Magazine, Mainframe - September/October 2016 - Cover2
IBM Systems Magazine, Mainframe - September/October 2016 - 1
IBM Systems Magazine, Mainframe - September/October 2016 - Table of Contents
IBM Systems Magazine, Mainframe - September/October 2016 - 3
IBM Systems Magazine, Mainframe - September/October 2016 - 4
IBM Systems Magazine, Mainframe - September/October 2016 - 5
IBM Systems Magazine, Mainframe - September/October 2016 - Editor's Desk: Mitigating money matters
IBM Systems Magazine, Mainframe - September/October 2016 - 7
IBM Systems Magazine, Mainframe - September/October 2016 - IBM Perspective: Linux on z Systems provides financial industry a foundation for blockchain
IBM Systems Magazine, Mainframe - September/October 2016 - 9
IBM Systems Magazine, Mainframe - September/October 2016 - Partner PoV: Virtualization helps improve time to market and data center operations
IBM Systems Magazine, Mainframe - September/October 2016 - 11
IBM Systems Magazine, Mainframe - September/October 2016 - 12
IBM Systems Magazine, Mainframe - September/October 2016 - IT Today: Blockchain's potential extends beyond the financial industry
IBM Systems Magazine, Mainframe - September/October 2016 - 14
IBM Systems Magazine, Mainframe - September/October 2016 - 15
IBM Systems Magazine, Mainframe - September/October 2016 - Case Study: The Right Tools: Educational Testing Service streamlines application calls and improves PCI compliance
IBM Systems Magazine, Mainframe - September/October 2016 - 17
IBM Systems Magazine, Mainframe - September/October 2016 - 18
IBM Systems Magazine, Mainframe - September/October 2016 - 19
IBM Systems Magazine, Mainframe - September/October 2016 - Cover Story: Process Transformation: Blockchain brings speed, security and transparency to business
IBM Systems Magazine, Mainframe - September/October 2016 - 21
IBM Systems Magazine, Mainframe - September/October 2016 - 22
IBM Systems Magazine, Mainframe - September/October 2016 - 23
IBM Systems Magazine, Mainframe - September/October 2016 - 24
IBM Systems Magazine, Mainframe - September/October 2016 - 25
IBM Systems Magazine, Mainframe - September/October 2016 - Feature: A Modern System: IBM midtier solutions exploit API and microservices to drive innovation
IBM Systems Magazine, Mainframe - September/October 2016 - 27
IBM Systems Magazine, Mainframe - September/October 2016 - 28
IBM Systems Magazine, Mainframe - September/October 2016 - 29
IBM Systems Magazine, Mainframe - September/October 2016 - 30
IBM Systems Magazine, Mainframe - September/October 2016 - Special Report: Mainframe Security Survey: Unauthorized users and external hackers are top concerns cited in survey
IBM Systems Magazine, Mainframe - September/October 2016 - 32
IBM Systems Magazine, Mainframe - September/October 2016 - 33
IBM Systems Magazine, Mainframe - September/October 2016 - 34
IBM Systems Magazine, Mainframe - September/October 2016 - 35
IBM Systems Magazine, Mainframe - September/October 2016 - 36
IBM Systems Magazine, Mainframe - September/October 2016 - 37
IBM Systems Magazine, Mainframe - September/October 2016 - 38
IBM Systems Magazine, Mainframe - September/October 2016 - 39
IBM Systems Magazine, Mainframe - September/October 2016 - 40
IBM Systems Magazine, Mainframe - September/October 2016 - 41
IBM Systems Magazine, Mainframe - September/October 2016 - Tech Corner: Create a DevOps pipeline for Java applications in CICS
IBM Systems Magazine, Mainframe - September/October 2016 - 43
IBM Systems Magazine, Mainframe - September/October 2016 - 44
IBM Systems Magazine, Mainframe - September/October 2016 - 45
IBM Systems Magazine, Mainframe - September/October 2016 - Solutions: zVT Control Center, dbDefender DAM Agent for DB2
IBM Systems Magazine, Mainframe - September/October 2016 - 47
IBM Systems Magazine, Mainframe - September/October 2016 - Stop Run: IBM software engineer balances his day job with acting
IBM Systems Magazine, Mainframe - September/October 2016 - Cover3
IBM Systems Magazine, Mainframe - September/October 2016 - Cover4
IBM Systems Magazine, Mainframe - September/October 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - September/October 2016 - SE1
IBM Systems Magazine, Mainframe - September/October 2016 - SE2
IBM Systems Magazine, Mainframe - September/October 2016 - SE3
IBM Systems Magazine, Mainframe - September/October 2016 - SE4
IBM Systems Magazine, Mainframe - September/October 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com