IBM Systems Lab Services

Four ways to build up your IBM Z networking skills

Share this post:

“I’ve lost all of my networking on IBM Z skills. Where can I find help?”

Has your company found itself in this position due to staff attrition, budget constraints or inability to backfill resources? Are you under pressure to secure your IBM Z network and/or critical IBM Z TCP/IP-based applications after a security audit? IBM Systems Lab Services for IBM Z and LinuxONE has provided support for companies around the world on these issues, and we can help you get back on track.

Here are four ways to build up your IBM Z networking skills.

1.Conduct a networking health check to understand the current mainframe environment.

As part of the networking health check, IBM Systems Lab Services can review your current mainframe configuration settings to provide recommended changes per IBM best practices for improving high availability and scalability while identifying any single points of failure. The findings and recommendations from the health check are documented in a report specific to your environment. We present each of the findings in the report to you in an open forum for questions and answers to ensure each of the recommendations is understood.

2. Provide skills transfer to your staff on their current mainframe networking environment.

Lab Services can also step through your current mainframe networking configuration files in a workshop-style format with your staff. This workshop can help you understand each of the mainframe networking components, parameters and how they interact to support your infrastructure.

3. Provide mainframe networking problem diagnosis, monitoring and troubleshooting hints and tips.

In a workshop format, IBM can provide hints, tips and recommended displays for troubleshooting problems and monitoring your SNA and TCP/IP mainframe networking environment. This includes discussing the available diagnostic traces and how to collect the traces for further problem diagnosis.

4. Secure and protect your IBM Z network and TCP/IP-based applications.

IBM can assess your IBM Z network to identify security gaps and provide recommended actions to mitigate the risks in accordance with Payment Card Industry Data Security Standard (PCI-DSS 3.2) and Security Technical Implementation Guide (STIG) requirements. IBM can also assess and provide recommended actions to secure and encrypt your critical System Z TCP/IP based applications. The findings and recommendations from the assessment are documented in a report specific to your environment. We present each of the findings in the report to you in an open forum for questions and answers to ensure each of the recommendations is understood.

These services from IBM can help your staff feel more confident about how your current mainframe network configurations are constructed and what commands to use for monitoring the mainframe networking environment. Your team will be better prepared in knowing which diagnostic traces they should collect based on the problem at hand, and this can lead to quicker turnaround on problem resolution. Your team will learn what IBM Z networking security gaps exist and how to mitigate those risks in the current environment. In addition, your team will learn how to secure and encrypt its critical IBM Z TCP/IP-based applications to meet security compliance standards.

Where to find support for IBM Z networking skills

Lab Services IBM Z and LinuxONE is an experienced group of IT consultants with proven expertise on the IBM Z and LinuxONE platforms to help clients design and deliver highly available z/OS, zVM, KVM, and Linux infrastructure solutions. Our specialty practices include:

  • Hybrid cloud
  • Blockchain
  • Analytics for cognitive business
  • Enterprise security
  • Enterprise Linux
  • Service predictability
  • Performance
  • IBM Z networking and networking security

Contact us today if we can help with your next project.

Senior Management IT Consultant, IBM Systems Lab Services – IBM Z and LinuxONE

More IBM Systems Lab Services stories

Data breaches: The threat is real

The threat is real. You see it in the newspaper headlines and on your TV news channel. As predicted years ago, data is now the new oil. As with any valuable resource, it has become the main target for criminal organizations. In the past, the threat came from burglars or spies. Now the threat is […]

Continue reading

Why education matters: Building skills for your future

When you make an investment in something, you want to get the most out of that experience — and often that means learning is required. Technology is evolving at an increasing pace. The skills many of us brought to the workplace may not be the skills we’ll need on our next project, but high-quality training […]

Continue reading

IBM AIX top trends for 2018

Today’s businesses demand infrastructure that’s secure, highly available and able to adapt quickly to changing business needs. They need innovative ways to deliver services to their customers. IBM AIX delivers these capabilities and more, and that’s why it’s still at the core of many IT ecosystems across industries. When you’re running mission-critical workloads on IBM […]

Continue reading