The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
To learn more about the value provided by zERT and other SMF data, please watch the full recording on Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.
You May Also Be Interested In:
Performance Analysis Leads to Improved Mainframe Security
Common views across technical silos helps foster effective communication and delivers timely responses to infrastructure and application changes without sacrificing safety.
Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption | IntelliMagic zAcademy
Given the importance of security in today’s world, managing network encryption is a critical requirement for almost every z/OS environment.
Banco do Brasil Ensures Availability for Billions of Daily Transactions with IntelliMagic Vision
Discover how Banco do Brasil enhanced its performance and capacity management with IntelliMagic Vision, proactively avoiding disruptions and improving cross-team collaboration.