IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe
Author: Axel Buecker
Publisher: IBM Redbooks
Total Pages: 480
Release: 2014-11-26
Genre: Computers
ISBN: 0738440094

Today, organizations engage with customers, business partners, and employees who are increasingly using mobile technology as their primary general-purpose computing platform. These organizations have an opportunity to fully embrace this new mobile technology for many types of transactions, including everything from exchanging information to exchanging goods and services, from employee self-service to customer service. With this mobile engagement, organizations can build new insight into the behavior of their customers so that organizations can better anticipate customer needs and gain a competitive advantage by offering new services. Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational rather than incremental innovation. This IBM® Redbooks® publication has an end-to-end example of creating a scalable, secure mobile application infrastructure that uses data that is on an IBM mainframe. The book uses an insurance-based application as an example, and shows how the application is built, tested, and deployed into production. This book is for application architects and decision-makers who want to employ mobile technology in concert with their mainframe environment.

End to End Security with z Systems

End to End Security with z Systems
Author: Lydia Parziale
Publisher: IBM Redbooks
Total Pages: 48
Release: 2015-04-03
Genre: Computers
ISBN: 0738454192

This IBM® RedpaperTM provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward. The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

System z on the Go: Accessing z/OS from Smartphones

System z on the Go: Accessing z/OS from Smartphones
Author: Alex Louwe Kooijmans
Publisher: IBM Redbooks
Total Pages: 230
Release: 2010-06-10
Genre: Computers
ISBN: 0738434434

In this IBM® Redbooks® publication we demonstrate that it is possible to combine the traditional strengths of the mainframe to manage large volumes of data and run business transactions with the Web 2.0 paradigm. We can get simpler interfaces, better integration among different services, lightweight protocols for communication, and much more, together with the availability, security, and reliability of mainframe data. And we will show how mainframe data can be accessed by smartphones such as Android or iPhone. But we can do more to demonstrate how flexible the mainframe platform is. Through the use of pervasive devices it is possible to add new possibilities to mainframe applications, extending System z® capabilities. We can receive notifications in real time, for example, of successful or unsuccessful termination of a TWS job stream, or we can immediately get alerts about abends that occurred in a critical application. This book is another demonstration that the mainframe is alive and kicking and can and should play a key role in modern application architectures.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Author: Axel Buecker
Publisher: IBM Redbooks
Total Pages: 494
Release: 2011-08-18
Genre: Computers
ISBN: 0738435880

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

Introduction to the New Mainframe: z/VM Basics

Introduction to the New Mainframe: z/VM Basics
Author: Lydia Parziale
Publisher: IBM Redbooks
Total Pages: 468
Release: 2008-01-10
Genre: Computers
ISBN: 0738488550

This textbook provides students with the background knowledge and skills necessary to begin using the basic functions and features of z/VM Version 5, Release 3. It is part of a series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to be literate in personal computing and have some computer science or information systems background. Others who will benefit from this textbook include z/OS professionals who would like to expand their knowledge of other aspects of the mainframe computing environment. This course can be used as a prerequisite to understanding Linux on System z. After reading this textbook and working through the exercises, the student will have received a basic understanding of the following topics: The Series z Hardware concept and the history of the mainframe Virtualization technology in general and how it is exploited by z/VM Operating systems that can run as guest systems under z/VM z/VM components The z/VM control program and commands The interactive environment under z/VM, CMS and its commands z/VM planning and administration Implementing the networking capabilities of z/VM Tools to monitor the performance of z/VM systems and guest operating systems The REXX programming language and CMS pipelines Security issues when running z/VM

Creating IBM z/OS Cloud Services

Creating IBM z/OS Cloud Services
Author: Jeffrey Bisti
Publisher: IBM Redbooks
Total Pages: 86
Release: 2016-02-08
Genre: Computers
ISBN: 0738441538

This IBM® Redbooks® publication discusses the real world experience of an enterprise that developed and implemented IBM z/OS® cloud services. This book shares the experience of a team at Walmart Technology, Walmart Stores, Inc.® and some of the decisions they made to create business critical cloud services. These experiences and approaches relate to the z/OS platform, and might not apply to other hybrid cloud approaches. This book highlights the strengths and characteristics of z/OS that led the Walmart infrastructure and software engineers to use this platform as they transitioned from a traditional IT deployment to a cloud model. Embarking on a cloud strategy can be overwhelming. No shortage of approaches to cloud computing exists. This book focuses on a pragmatic approach for enterprises that are struggling to take advantage of their business assets in the cloud. This book introduces the basic cloud concepts as defined by the National Institute of Standards and Technology (NIST). Each chapter explains the importance of a particular NIST characteristic, the z/OS role in accomplishing the characteristic, and how it was implemented by the Walmart Technology team. This book is intended for IT professionals who are considering extending their IBM z SystemsTM environment to a hybrid cloud by unleashing the power of cloud services on z/OS. For information about creating cloud services that are hosted in IBM CICS®, see How Walmart Became a Cloud Services Provider with IBM CICS, SG24-8347.

Getting Started: Journey to Modernization with IBM Z

Getting Started: Journey to Modernization with IBM Z
Author: Makenzie Manna
Publisher: IBM Redbooks
Total Pages: 90
Release: 2021-03-15
Genre: Computers
ISBN: 0738459534

Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Author: Axel Buecker
Publisher: IBM Redbooks
Total Pages: 200
Release: 2015-11-02
Genre: Computers
ISBN: 0738441023

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

Rethink Your Mainframe Applications: Reasons and Approaches for Extension, Transformation, and Growth

Rethink Your Mainframe Applications: Reasons and Approaches for Extension, Transformation, and Growth
Author: Mike Ebbers
Publisher: IBM Redbooks
Total Pages: 76
Release: 2013-05-04
Genre: Computers
ISBN: 0738450944

Today there are new and exciting possibilities available to you for creating a robust IT landscape. Such possibilities include those that can move current IT assets into the twenty-first century, while supporting state-of-the-art new applications. With advancements in software, hardware and networks, old and new applications can be integrated into a seamless IT landscape. Mobile devices are growing at exponential rates and will require access to data across the current and new application suites through new channels. Cloud computing is the new paradigm, featuring anything from SaaS to full server deployment. And although some environments are trying to virtualize and secure themselves, others such as IBM® zEnterprise® have been at the forefront even before cloud computing entered the scene. This IBM RedpaperTM publication discusses how transformation and extensibility can let you keep core business logic in IBM IMSTM and IBM CICS®, and extend BPM, Business Rules and Portal in IBM WebSphere® on IBM z/OS® or Linux on IBM System z® to meet new business requirements. The audience for this paper includes mainframe architects and consultants.