IntelliMagic Vision for z/OS Db2, CICS, WebSphere, TCP/IP & MQ

IntelliMagic Vision for z/OS enables you to derive great value from the large quantities of measurement data provided by these critical subsystems. It provides you with an intuitive GUI to dynamically navigate through the data. IntelliMagic Vision also harnesses the power of the computer to automatically assess dozens of key metrics for each subsystem, Db2, CICS, WebSphere, TCP/IP & MQ, to proactively identify potential risks to availability.

Db2

See Buffer Pool imbalances and proactively identify upcoming risks to your Db2 health and performance

Learn More

CICS Transactions

Save time looking for problems, profile CICS transaction data and monitor transaction response time

Learn More

WebSphere

Monitor the performance and resource usage of WebSphere transactions

Learn More

TCP/IP

Monitor the health of your TCP/IP and analyze traffic from different perspectives.

Learn More

MQ Subsystems

Proactively and automatically manage MQ performance.

Learn More

Applications

View your z/OS data from the application perspective

Learn More

Other Parts of the z/OS Environment Supported

Systems, Processors & MLC

Continual visibility into how the z/OS systems infrastructure is handling your workloads helps you improve performance and protect availability.
Learn More

Disk and Replication

Early warning system that automatically identifies I/O issues in the making in your disk storage system and replication architecture.
Learn More

Virtual Tape

Performance and availability management for Virtual and Physical Tape, with specific support for IBM TS7700 and Oracle VSM tape solutions.
Learn More

Related Resources

Webinar

Gain Insight Into z/OS Network Security Usage and WebSphere Transactions

SMF data provides all the information performance analysts need to derive key performance insights. Join this webinar to learn how to derive more intelligence from zERT and WebSphere SMF data.

Watch Webinar
Video

Intelligent Analysis of TCP/IP zERT Summary Data

TCP/IP’s z/OS Encryption Readiness Technology (zERT) feature provides a single source of data to determine which traffic to and from your site is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.

Watch video
Video

How to Use IBM’s zERT to Identify Unencrypted Connections

The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections.

Watch video

Go to Resources

Contact Our Experts

Whether you’re in the early stages of product research, evaluating competitive solutions, or trying to solve a problem, we’re happy to help you get the information you need to move forward with your IT initiatives.