World Wide Legal Update on Security, Regulatory Compliance, Auditing and Privacy Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance Around the World in . . . 55 minutes! - World wide legal and... Learn more
Is NetView for z/OS Active or on Standby with Your GDPS Active/Active Sites? Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance NetView Monitoring for GDPS along with NetView for z/OS are key... Learn more
Safe and Secure Transfers with z/OS FTP Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance FTP is a readily available; convenient; and inexpensive technology to... Learn more
z/OS Communications Server Network Security Overview Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Traditionally; network security has been placed at the enterprise... Learn more
Network Security for the z/OS Systems Programmer; Part 1 of 2 Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance With IT budgets shrinking and roles expanding within an organizations... Learn more
z/OS Communications Server Security Using Policy Agent Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Policy Agent is required for the following z/OS support: • Quality of... Learn more
NetView for z/OS: New Directions Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance For years; NetView for z/OS has provided the network and system... Learn more
Introduction to Mainframe Network Management Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance There are a ton of management tools available to help your mainframe... Learn more
z/OS Communication Server Intrusion Detection Services Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance There are many types of intrusion detection systems being deployed... Learn more
The Three Headed Dog Ate My SSH Keys! - Using OpenSSH in a Single Sign-on Corporate Environment with z/OS; Windows and Linux Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Kerberos is an integral part of Windows Active Directory and is also... Learn more
OpenSSH for z/OS: New Features and Functions Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance IBM has announced that OpenSSH will be included as a base element in... Learn more
Network Trace Analysis Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Network traffic analysis at the packet level is critical to diagnosing... Learn more
RACF Command Tips Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance How do I get rid of the RACF-bit on a dataset when there is no discrete... Learn more
Using RACF's UNIXPRIV Class Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Permission to certain UNIXPRIV class profiles can provide users with... Learn more
LongTail: FOSS ssh Honeypot and Analytics Software Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance LongTail is both a honeypot and a set of programs that analyze ssh... Learn more
The Top Ten Security Vulnerabilities in z/OS Security Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance In this session we will discuss the need to be proactive in auditing... Learn more
Why Complex Passwords Should Be Fact and Not Fiction Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance All three Enterprise Security Managers provide a number of options to... Learn more
Best Practices for Securing Privileged Accounts Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance New risk factors and compliance requirements are making mainframe... Learn more
Security Opening - Why Do Enterprises that Pass IT Audits Still Suffer Major Security Breaches? Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Join us to learn about the SHARE Security week ahead! How is it that... Learn more
A Potpourri of New Industry Standards and Regulatory Compliance Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Learn from our panel of experts what has changed and how to improve... Learn more
Topics on Mainframe Encryption: Password Cracking and Self-Encrypting Drives Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Enterprise security has always been concerned with password protection... Learn more
z/OS Digital Certificates Tips and Tricks Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance In this session the speaker gives some tips for using certificates on... Learn more
What's New in z Systems Crypto Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Learn about new crypto features available for z13; CPACF; CEX5S and... Learn more
SHARE Live!: IoT & BYOD – The New Security Risks Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance In a world ever more connected to the internet; Security should be... Learn more
Mainframe Security: It's Not Just about Your ESM (RACF; ACF2 or TSS); It's about so Much More. Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Let's take a look at some of the security controls available to help us... Learn more