zERT
Analyze a single source to determine which traffic is cryptographically protected and which is not.
The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
Analyze a single source to determine which traffic is cryptographically protected and which is not.
Monitor the health of your TCP/IP and analyze traffic from different perspectives.
Utilize AI-driven analytics to proactively monitor and manage your z/OS Systems environment.
Save time looking for problems and profile CICS transaction data and see transaction response time.
See Buffer Pool imbalances and proactively identify upcoming risks to your Db2 health and performance.
Early warning system that automatically identifies I/O issues in the making in your disk storage system and replication architecture.
Performance and availability management for Virtual and Physical Tape, with specific support for IBM TS7700 and Oracle VSM tape solutions.
Experience firsthand the deepest visibility into your z/OS systems, processors, network, disk and tape environments. Whether you’re in the early stages of product research, evaluating competitive solutions, or trying to solve a problem, we’re happy to help you get the information you need to move forward with your IT initiatives.