The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
To learn more about the value provided by zERT and other SMF data, please watch the full recording on Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.
You May Also Be Interested In:
Performance Analysis Leads to Improved Mainframe Security
Common views across technical silos helps foster effective communication and delivers timely responses to infrastructure and application changes without sacrificing safety.
Mainframe encryption causes higher demand in TCP/IP address space
Many shops are using IBM’s pervasive encryption to protect their mainframe's integrity, but how do we get in front of the mainframe impacts or know which encryption methods might meet security requirements at lower cost?
Monitoring TCP/IP Performance for z/OS with SMF 119 Metrics
Gain visibility into the mainframe TCP/IP communications infrastructure performance with SMF 119 metrics. Numerous activity and utilization metrics are reported.