Is Your z/OS Network Traffic Properly Encrypted? zERT Has the Answer!
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2018 ,
SHARE St. Louis 2018
As you extend your Pervasive Encryption for IBM Z® strategy to your z/OS network traffic, it is imperative to assess and understand the quality of the cryptographic network protection being applied to your z/OS workloads. But with so many security protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session describes the z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the the data that you need to build a complete picture of your z/OS cryptographic network protection posture. We will look at what is available today as well as some new capabilities that are on the way to make it much easier to access and use the data that zERT provides.-Chris Meyer-IBM Corporation; Edward Seidl-IBM Corporation
Back to Proceedings File Library