Dear readers,
As a replacement this year, we are planning a webcast in English covering Data Center Intelligence (DCI) and Identity Access Governance (IAM) on the original date of 23 April 2020.
Dear readers,
As a replacement this year, we are planning a webcast in English covering Data Center Intelligence (DCI) and Identity Access Governance (IAM) on the original date of 23 April 2020.
Even the securest IBM Z installations in top security environments are exposed to hacking threats that are underestimated, downplayed or simply unknown to most mainframe operations and security teams. What is your risk exposure, what methods social hackers are using and what are recommended steps to protect yourself from those dangers?
Most people would say no. Such an idea sounds almost crazy.
Still this is more than likely to have happened at quite a few banks, as more and more banks outsource mainframe operations to service providers. The ironic thing about this is that it is indeed on the mainframe where the bank’s absolutely most critical information assets are to be found!
More than 80 percent of all global z/OS installations employ RACF (Resource Access Control Facility), the IBM tool for identifying and verifying users, managing access rights and logging access to protected resources. Based on the probable assumption that IBM mainframe systems are likely used by very large companies, it can be said with great confidence that RACF protects the security of the world’s most complex IT landscapes.
Beta UX Output Management and Archive
The latest version of the Beta UX 4.4. output management and archive suite has just been released. For several months, the team evaluated numerous suggestions and requirements communicated to us by our customers and implemented these in the 4.4. release. The changes aim at making document handling with the Beta UX Suite even more secure and intuitive.
Yves Colliard was born in 1962, so he can be considered one of the youngest mainframe pioneers.
The Swiss native has dedicated more than thirty years to the z/OS platform, and early on the clever entrepreneur discovered a niche that he has been occupying with his products.
The exclusive sales partnership with Beta Systems is a win-win situation in three regards: For his company YCOS GmbH, for Beta Systems as well as for both companies’ customers. The following interview with the IBM expert provides insights into his business model.
But what makes it increasingly ‘sexy’ and worth paying attention to is the potential for significant cost savings it holds. Taking advantage of this potential is a good strategy for C-level managers – who tend to be in charge of OM – to make their mark.