Is Your z/OS Network Traffic Properly Encrypted? zERT Has the Answer!
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Phoenix 2019 ,
2019
As you extend your Pervasive Encryption for IBM Z strategy to your z/OS network traffic, it is imperative to assess and understand the quality of the cryptographic network protection being applied to your z/OS workloads. But with so many security protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible.
In this session the speaker describes the z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the the data that you need to build a complete picture of your z/OS cryptographic network protection posture. We will look at what is available today as well as some new capabilities that are on the way to make it much easier to access and use the data that zERT provides.-Chris Meyer-IBM Corporation; Navya Ramanjulu-IBM
Back to Proceedings File Library