A Holistic Approach to Mainframe and Enterprise Security
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Atlanta 2016 ,
2016
When you think of information security you think of RACF, ACF2 or Top Secret. But what about your counterparts in Enterprise Network Security? What do they use to coordinate the security of Web servers, firewalls, application servers and distributed databases? It turns out they have some pretty cool tools that your organization has invested heavily in, with real-time alerting by e-mail or text, cross-platform correlation of suspicious events, point-and-click graphics, powerful search, and months’ or years’ worth of tamper-evident archives.
Hackers probing your enterprise use a single-system approach to finding your vulnerabilities – shouldn’t you also take a holistic approach to keeping them out? If your mainframe security subsystem is not connected in real time to your enterprise security, your siloed approach is essentially fighting cyber-crime with one hand behind your back. Come to this session and learn about the highly-effective network security tools your enterprise already owns, and how to use them to protect your mainframe as well.-Charles Mills-CorreLog
Back to Proceedings File Library