Intelligent Analysis of TCP/IP z/OS Encryption Readiness Technology Summary Data
TCP/IP’s z/OS Encryption Readiness Technology (zERT) feature provides a single source of data to determine which traffic to and from your site is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.
This video covers:
- What the new IBM zERT feature is
- What data is (and isn’t) collected by zERT
- The value of zERT data for network security administrators
- And a demonstration of navigating zERT data using an interactive, web-based solution
Watch the full recording to learn more about the value provided by zERT and other SMF data: Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.
For more on this topic, please read Cheryl Watson’s Tuning Letter Reprint of Managing Encryption of Network Traffic with IBM zERT.
You May Also Be Interested In:
Blog
Performance Analysis Leads to Improved Mainframe Security
Common views across technical silos helps foster effective communication and delivers timely responses to infrastructure and application changes without sacrificing safety.
Webinar
Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption | IntelliMagic zAcademy
Given the importance of security in today’s world, managing network encryption is a critical requirement for almost every z/OS environment.
Webinar
MQ: How to Extract Insights and Optimize Performance Using SMF Data | IntelliMagic zAcademy
This webinar will introduce you to best practices for enhancing your analysis of MQ Statistics (SMF 115) and Accounting (116) data.
Book a Demo or Connect With an Expert
Discuss your technical or sales-related questions with our mainframe experts today
How to Use IBM’s zERT to Identify Unencrypted Connections
The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
To learn more about the value provided by zERT and other SMF data, please watch the full recording on Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.
You May Also Be Interested In:
Blog
Performance Analysis Leads to Improved Mainframe Security
Common views across technical silos helps foster effective communication and delivers timely responses to infrastructure and application changes without sacrificing safety.
Webinar
Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption | IntelliMagic zAcademy
Given the importance of security in today’s world, managing network encryption is a critical requirement for almost every z/OS environment.
Webinar
MQ: How to Extract Insights and Optimize Performance Using SMF Data | IntelliMagic zAcademy
This webinar will introduce you to best practices for enhancing your analysis of MQ Statistics (SMF 115) and Accounting (116) data.
Book a Demo or Connect With an Expert
Discuss your technical or sales-related questions with our mainframe experts today