When Legacy Security Is Just Not Enough
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE in Anaheim 2014 ,
2014
Information System Security, the freedom from loss and/or misuse of data and/or information services, and the System Professionals charged with protecting the zEnterprise are consistently under attack from an every evolving set of persistent external and internal threats, and the often unintended consequences of threats that emerge from regulatory and technological changes.
More likely then not, the tools and methods used to detect and defend against these evolving threats are inadequate, often out-of-date. Accepted reasons for this “Risky State of Affairs” support only the status quo. None should be considered reasonable or acceptable. In short, Legacy Security practices are just not enough to secure the modern zEnterprise.
This presentation will provide insight into: • The onslaught of External Threats, and how the z/OS Communication Server Policy Based Management defends against such threats
• The dependency for z/OS Integrity on the ESM and its working companion, conventional Change Management, the resulting “Control Gap”, and how to fill it
• How specific integrity and compliance requirements can be fulfilled with unique Integrity Enabled Tools, such as Xbridge DataSniff and Vanguard Configuration Manager
• How rapid changes in hardware and software technologies necessitate comparable advances in security strategies, including V2R1 updates and zSystem Security Portal examples
-Paul Robichaux-NewEra Software, Inc.
Back to Proceedings File Library