A Moat Around Your Mainframe - Thwarting Network-Based Attacks on z/OS
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Virtual 2020 ,
2020
Network-based attacks are nothing new. Determined hackers can use information that's freely available on your network to enumerate your systems and find ways to attack them. Once that's done, the hackers can attack and even attempt to exfiltrate data from your systems. So what can a z/OS network systems programmer do to detect, deter and even stop such attacks? In this session, BMC Software's Chad Rikansrud and IBM's Chris Meyer will demonstrate common network-based attacks along with a variety of z/OS network security features that can be used to defend against them. Discover how features like z/OS Intrusion Detection Services, IP Packet and Defensive Filtering, network access controls and more can create a moat to protect your z/OS castle from network hackers!-Chad Rikansrud-BMC; Chris Meyer-IBM Corporation
Back to Proceedings File Library