Lab: Pervasive Encryption - Let's Encrypt Some Data Sets! Tags: Proceedings, SHARE Sacramento 2018, 2018 Come to this hands-on lab to try out data set encryption for yourself!... Learn more
Live: Pervasive Encryption Demo: Loading Master Keys Using ICSF Tags: Proceedings, SHARE Sacramento 2018, 2018 Attend this session to learn how to generate and load master keys using... Learn more
Live: Pervasive Encryption Deep Dive: Enterprise Key Management Tags: Proceedings, SHARE Sacramento 2018, 2018 Are you getting started with Pervasive Encryption? Have you considered... Learn more
Live: Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption Tags: Proceedings, SHARE Sacramento 2018, 2018 Join us for a step-by-step demonstration of data set encryption. See... Learn more
Live: z14 Crypto Update Tags: Proceedings, SHARE Sacramento 2018, 2018 IBM Z has a 40+ year history in security and cryptography starting with... Learn more
RACF Update: V2R3 and Multi-Factor Authentication Tags: Proceedings, SHARE Sacramento 2018, 2018 What are the latest RACF features that are of interest to every... Learn more
Exploiting the Mainframe 101 Tags: Proceedings, SHARE Sacramento 2018, 2018 How easy is to exploit the Mainframe. The answer should be "very... Learn more
Guidelines for Managing z/OS Vulnerabilities Tags: Proceedings, SHARE Sacramento 2018, 2018 Has anyone told you that all it takes is one zero day vulnerability in... Learn more
Security for Z – Beyond Your ESM and SIEM Tags: Proceedings, SHARE Sacramento 2018, 2018 Event logging, access control and data encryption still leave... Learn more
The Beginning of Data Security Tags: Proceedings, SHARE Sacramento 2018, 2018 It’s been 40 years since ACF2 was developed at the London Life... Learn more
Digital Certificates -- How they Really Work, Part 1 of 3 Tags: Proceedings, SHARE Sacramento 2018, 2018 Starting with V2R3, IBM is no longer shipping "standard"... Learn more
SMP/E Abused Tags: Proceedings, SHARE Sacramento 2018, 2018 If you are an experienced systems programmer, there's a strong... Learn more
Securing the Access to Host Assets From 3270 TE Clients Tags: Proceedings, SHARE Providence 2017, 2017 In the beginning, 3270 terminals were wired directly into CICS... Learn more
Better Alternatives to Mainframe File Transfer Protocol Tags: Proceedings, SHARE Providence 2017, 2017 FTP and SFTP are typical mechanism used in mainframe environments to... Learn more
New to NetView for z/OS? How to Go From Walking to Running! Tags: Proceedings, SHARE Providence 2017, 2017 NetView for z/OS provides functions to help maintain the highest degree... Learn more
Finding the Needle in a Haystack: Diagnosing Common OpenSSH Problems Tags: Proceedings, SHARE Providence 2017, 2017 This session will provide detailed diagnostic steps for determining the... Learn more
How IBM Can Identify z/OS Networking Issues Without Tracing Tags: Proceedings, SHARE Providence 2017, 2017 See how IBM's OMEGAMON for Mainframe Networks leverages z/OS... Learn more
z/OS Security Management Using Policy Agent Tags: Proceedings, SHARE Providence 2017, 2017 Policy Agent is required for the following z/OS support: • Quality of... Learn more
z/OS Communications Server Application Transparent TLS Tags: Proceedings, SHARE Providence 2017, 2017 As security concerns continue to increase, more enterprises are... Learn more
Lab: Encryption Using Configuration Assistant for z/OS V2R2, Part 2 of 2 Tags: Proceedings, SHARE Providence 2017, 2017 Secure encryption end-to-end is being implemented more often these days... Learn more
Lab: Encryption Using Configuration Assistant for z/OS V2R2, Part 1 of 2 Tags: Proceedings, SHARE Providence 2017, 2017 Secure encryption end-to-end is being implemented more often these days... Learn more
Improve Your NetView for z/OS Experience! Tags: Proceedings, SHARE Providence 2017, 2017 NetView for z/OS provides network and system management capabilities... Learn more
z/OS Communications Server Network Security Overview Tags: Proceedings, SHARE Providence 2017, 2017 Traditionally, network security has been placed at the enterprise... Learn more
Effective Network Trace Analysis Tags: Proceedings, SHARE Providence 2017, 2017 Network traffic analysis at the packet level is critical to diagnosing... Learn more
Determining Who's Using What Network Encryption on Your z/OS System: zERT Is Coming! Tags: Proceedings, SHARE Providence 2017, 2017 With so many corporate, industry, and government regulations regarding... Learn more