Identify and Remediate Unencrypted Traffic

IBM’s zERT (z/OS Encryption Readiness Technology) positions the TCP/IP as the focal point for collecting and reporting on cryptographically protected (and unprotected) traffic.

IntelliMagic Vision allows network security administrators to take advantage of an intuitive, GUI-based web reporter to easily navigate, report on, and analyze data reported on TCP/IP and zERT SMF 119 records.

zERT Resources


Mainframe encryption causes higher demand in TCP/IP address space

Many shops are using IBM’s pervasive encryption to protect their mainframe's integrity, but how do we get in front of the mainframe impacts or know which encryption methods might meet security requirements at lower cost?

Read more

Deriving Insights from SMF 116 MQ Accounting Data

MQ Accounting records are often considered to be too expensive, both in CPU overhead and SMF record volume. However, we believe that these concerns may be overstated.

Read more

MQ Accounting - Learning From SMF

This article is designed to introduce you to the types of insights that are available through SMF data with a focus on the SMF 116 MQ Accounting data.


More zERT Resources

Intelligent Analysis

IBM’s TCP/IP zERT Feature

TCP/IP’s zERT feature provides a single source to determine which traffic is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.

For traffic with recognized cryptographic protection, you can determine which cryptographic protocol is used, which cryptographic algorithms are used, the length of the cryptographic keys, and other important attributes of the cryptographic protection. This information is valuable for determining regulatory compliance and for identifying connections that might need stronger cryptographic protection.

zERT data is produced by zERT Summary (SMF 119 subtype 12) records, which are written on a per-security-session basis at the end of each SMF interval to summarize the repeated use of security sessions during the interval.

Understand and Evaluate Cryptographic Protocols

IntelliMagic Vision for z/OS TCP/IP and zERT automatically analyzes zERT Summary records and provides additional, enhanced analysis, including:

  • Categorizing “traffic classes” based on IP address ranges
  • Defining traffic classes by:
    • Sysplex – between z/OS sysplexes (“intra” or “inter”)
    • Local – to other platforms within the data center
    • Partner – external traffic with “special” partners
    • Public – all other external traffic
  • A free-form “IP Label” can also be assigned to further describe IP ranges
  • Translates all of the more than 600 raw codes from zERT records into readable text for cipher suite, encryption algorithms, and message authentication types.

Example Reports

TLS Specific Protocol Information


Average CP Core Usage for Crypto Functions, and Connections for all TCP zERT Summary Data by Sysplex ID

TCP/IP Encryption Compliance Services

This IntelliMagic service, which combines IntelliMagic’s software technology with the vast experience of the IntelliMagic experts, is the best way to accomplish the difficult task of encryption security policy compliance. IntelliMagic’s experience includes working with the largest and most complex mainframe shops on many aspects of z/OS infrastructure analysis.

Supported Areas in IntelliMagic Vision for z/OS


Monitor the health of your TCP/IP and analyze traffic from different perspectives.

Learn More

MQ Subsystems

Proactively and automatically manage MQ performance.

Learn More


Track the response time and resource consumption of WebSphere transactions.

Learn More

z/OS Systems

Utilize AI-driven analytics to proactively monitor and manage your z/OS Systems environment.

Learn More

MLC Cost Saver

Tune your processor configuration to increase the MIPS you get out of your mainframe hardware.

Learn More

CICS Transactions

Save time looking for problems and profile CICS transaction data and see transaction response time.

Learn More

Show all