Cybercrime Fighting for Mainframe Superheroes – A Holistic Approach
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Providence 2017 ,
2017
Hackers probing your enterprise use a single-system approach to finding your vulnerabilities – shouldn’t you also take a holistic approach to keeping them out? When you think of information security you think of RACF, ACF2 or Top Secret. But what about your counterparts in Enterprise Network Security? What do they use to coordinate the security of Web servers, firewalls, application servers and distributed databases? It turns out they have some pretty cool tools that your organization has invested heavily in, with real-time alerting by e-mail or text, cross-platform correlation of suspicious events, point-and-click graphics, powerful search, and months’ or years’ worth of tamper-evident archives.Â
If your mainframe security subsystem is not connected in real time to your enterprise security tools, you are fighting potential intruders with one hand tied behind your back. Come to this session and learn about the highly-effective network security tools your enterprise already owns, and how to use them to help protect your mainframe as well.-Charles Mills-CorreLog
Back to Proceedings File Library