Crypto 101: Meet Alice and Bob Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance Join this session for an introduction to cryptography concepts such as... Learn more
Lab: As Cool as ICE: Using ICETOOL with RACF Data Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance The RACF Unload Utilities (IRRDBU00 and IRRADU00) are allow you to... Learn more
RACF IRRXUTIL, System REXX, and the IBM Health Checker for z/OS: A Perfect Combination! Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance The RACF REXX interface (IRRXUTIL), system REXX, and the IBM Health... Learn more
RACF Update Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance What are the latest RACF features that are of interest to every... Learn more
A Holistic Approach to Mainframe and Enterprise Security Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance When you think of information security you think of RACF, ACF2 or Top... Learn more
Encryption? Yeah, We Do That Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance So you need to do some encryption on your z/OS system. Of course,... Learn more
A New Look at Mainframe Hacking and Penetration Testing Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance Following on from the succesful mainframe hacking class that Mark has... Learn more
RACF for Dummies – Presented by a Dummy Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance A high level overview of IBM RACF aimed at the zNextGen stream or... Learn more
World Wide Legal Update on Security, Regulatory Compliance, Auditing and Privacy Tags: Proceedings, SHARE Atlanta 2016, 2016 Categories: Enterprise Data Center, Security and Compliance Around the World in . . . 55 minutes! - World wide legal and... Learn more
Is NetView for z/OS Active or on Standby with Your GDPS Active/Active Sites? Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance NetView Monitoring for GDPS along with NetView for z/OS are key... Learn more
Safe and Secure Transfers with z/OS FTP Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance FTP is a readily available; convenient; and inexpensive technology to... Learn more
z/OS Communications Server Network Security Overview Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Traditionally; network security has been placed at the enterprise... Learn more
Network Security for the z/OS Systems Programmer; Part 1 of 2 Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance With IT budgets shrinking and roles expanding within an organizations... Learn more
z/OS Communications Server Security Using Policy Agent Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Policy Agent is required for the following z/OS support: • Quality of... Learn more
NetView for z/OS: New Directions Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance For years; NetView for z/OS has provided the network and system... Learn more
Introduction to Mainframe Network Management Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance There are a ton of management tools available to help your mainframe... Learn more
z/OS Communication Server Intrusion Detection Services Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance There are many types of intrusion detection systems being deployed... Learn more
The Three Headed Dog Ate My SSH Keys! - Using OpenSSH in a Single Sign-on Corporate Environment with z/OS; Windows and Linux Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Kerberos is an integral part of Windows Active Directory and is also... Learn more
OpenSSH for z/OS: New Features and Functions Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance IBM has announced that OpenSSH will be included as a base element in... Learn more
Network Trace Analysis Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Network traffic analysis at the packet level is critical to diagnosing... Learn more
RACF Command Tips Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance How do I get rid of the RACF-bit on a dataset when there is no discrete... Learn more
Using RACF's UNIXPRIV Class Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance Permission to certain UNIXPRIV class profiles can provide users with... Learn more
LongTail: FOSS ssh Honeypot and Analytics Software Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance LongTail is both a honeypot and a set of programs that analyze ssh... Learn more
The Top Ten Security Vulnerabilities in z/OS Security Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance In this session we will discuss the need to be proactive in auditing... Learn more
Why Complex Passwords Should Be Fact and Not Fiction Tags: Proceedings, 2016, SHARE in San Antonio 2016 Categories: Enterprise Data Center, Security and Compliance All three Enterprise Security Managers provide a number of options to... Learn more