The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
Supported Areas in IntelliMagic Vision for z/OS
Analyze a single source to determine which traffic is cryptographically protected and which is not.Learn More
Monitor the health of your TCP/IP and analyze traffic from different perspectives.Learn More
Proactively and automatically manage MQ performance.Learn More
Track the response time and resource consumption of WebSphere transactions.Learn More
Utilize AI-driven analytics to proactively monitor and manage your z/OS Systems environment.Learn More
Save time looking for problems and profile CICS transaction data and see transaction response time.Learn More
Experience firsthand the deepest visibility into your z/OS systems, processors, network, disk and tape environments. Whether you’re in the early stages of product research, evaluating competitive solutions, or trying to solve a problem, we’re happy to help you get the information you need to move forward with your IT initiatives.