BigFix® customers are medium- and large- sized companies that use the product to manage mostly software and security of a certain amount of computers (that amount may vary from dozens to tens of thousands). Many of these customers requested a way to quickly collect information from their environments because BigFix has not been natively built to provide high response times, but rather, persistence and effectiveness. In the first quarter of 2016, the BigFix Rome development team worked on a solution that was able to fulfill these requests; this solution is BigFix Query. Read the tutorial here.
On October 1, 2015 IBM issued a Statement of Direction about providing 64-bit addressing support in IBM Security zSecure. This support has now become available as a Service Stream Enhancement (SSE) to zSecure 2.2.0.
64-bit addressing allows the use of memory above the 2GB "bar" implied by addresses consisting of only 31 bits. Besides allowing the program to store and retrieve larger amounts of data, this also frees up memory "below the bar" that can be used by (other) 31-bit addressing programs.
Typical functions in zSecure that benefit from having a lot of memory available include
- processing very large numbers of events from the SMF event log, e.g. as sent on to IBM Security QRadar SIEM;
- analyzing data for many security databases and LPARs at the same time;
- rule-based compliance analysis based on many underlying technical reports;
- analyzing large intervals (possibly a year or more) of access use data, e.g. to identify obsolete permissions.
The SSE also includes enhancements to 31-bit addressing support. Details can be found in this blog entry by Jeroen Tiggelman on the Service Management Connect - System z blog.
The changes apply to all components of zSecure for z/OS except for zSecure CICS Toolkit and zSecure Command Verifier. For the full benefits a z196 or newer hardware is required.
If you haven't already, watch videos from the IBM Security Summit. Highlights include a presentation by Ginny Rometty on the future of cognitive security.
What if you could build your own authorization proxy that could receive requests and check if they are authorized? It would mean that you could be in greater control of authorization. Read the tutorial on this fairly easy method of creating your own fine-grained authorization if you are not satisfied with your SaaS's authorization checks.
IBM Security Guardium® now has several enhancements that became available on June 3, 2016.
Among the enhancements for V10.1 are:
Read the tutorial for full details.
The figure below is just one of the new enhancements for this release, where administrators are able to see at a glance if there are issues in their managed environment and address them before they get worse.
Watch the tech talk here, which outlines the updates and enhancements.
You can also receive updates to IBM Guardium by signing up for the IBM
So many of us use mobile devices in our day-to-day lives; from business to personal, mobile security is an important topic to ensure that we can safely use our phones, tablets, and more. The ease and convenience of mobile devices comes a great cost:
"...mobility comes with a greater number of security risks and concerns than expected...and more IT resources are required to support the increased number of devices and applications."
This report is an anonymous survey and the findings show how mobile devices have changed security, how businesses are changing the ways that they work, and how they're trying to protect their data.
On February 16, 2016 IBM announced authentication enhancements for z Systems, including a new product IBM Multi-Factor Authentication for z/OS (5655-162), with a planned availability date of March 25, 2016.
IBM z/OS Security Server Resource Access Control Facility (RACF) provided enabling infrastructure updates for z/OS V2R1 and V2R2.
IBM Security zSecure suite provided supporting updates for zSecure 2.1, 2.1.1, and 2.2.
Multi-Factor Authentication raises the level of assurance of mission-critical systems by requiring authentication with multiple factors during the logon process.
Each authentication factor must be from a separate category of credential types:
1) Something you know (e.g. a password or PIN code),
2) Something you have (e.g. an ID badge or a cryptographic key),
3) Something you are (e.g. a fingerprint or other biometric data).
More details can be located through this blog entry by Jeroen Tiggelman on the Service Management Connect - System z blog.
You might also be interested in the zSec
Comment (1) Visits (1843)
Exciting news out of the #IBMSecuritySummit that signifies our journey into the era of #CognitiveSecurity – Watson for Cyber Security is a new version of Watson trained in the language of security and delivered via the IBM Cloud. http
Read the blog post over at IBM Security at http
You can read more about Cognitive Security here.
An assessment of recent data from IBM Managed Security Services (IBM MSS) reveals some interesting findings about attack vectors that don’t make headlines anymore: "Footprinting and Password Brute Force Attack Patterning."
IBM Security Guardium® leads the way in providing a monitoring and auditing solution for NoSQL database systems. In this article by Kathryn Zeidenstein and Sundari Voruganti, the authors provide an overview of one popular NoSQL database, Apache Cassandra, and explain how and why Guardium can help organizations protect Cassandra data and automate compliance reporting and sign-offs. This article includes detailed instructions and a sample security policy to help you configure Guardium and extract value immediately.
Too often, we hear of huge corporations being attacked and losing valuable client information. What can be done if this happens to you? What can be learned from others' mistakes?
Ori Pomerantz's new tutorial discusses how to write an application in the Bluemix Time Series Database. This application allows you to view information quickly from a dashboard and generate time-stamped statistics. By creating reports on events by time, components, and hosts, you can determine if there are any patterns by looking at current and past malicious activity. With this in mind, use analytics from these reports to determine future malicious behavior. Then you'll know how to better prepare yourself and your organization from future attacks, safeguarding your most precious data.
Short URL for this post: http
IBM provides advance notification of End Of Support (EOS) dates allowing customers reasonable time to complete software upgrades or to refresh appliance products. To view upcoming EOS dates by product segment, click a link in the list below.
View all IBM Software EOS announcements for 2017 and 2018.
Q: What are the major Support Lifecycle milestones?
A: The major Support Lifecycle milestones are:
Q: How do you determine if your installed software is still supported?
A: Search by product name or keyword using the Supp
Q: What happens when EOS is announced?
A: Often, there is a newer version of the software available for download. In most cases, you’ll have sufficient time to plan for and install the latest version. For more information on the lifecycle stages, including EOS, view this short YouTube video on the IBM
Q: What is the standard version format for IBM Software products?
A: The full product version is expressed by a four-digit code known as the IBM Version, Release, Modification and Fix Level structure, or VRMF. View this Technote for additional information and description of each element. You may also find this Glossary of product support and maintenance terms helpful.
Q: Where can you view additional details on product updates or replacement information?
A: Using the Support Lifecycle Search, search for your product, select View for details and click the EOS announcement link to view Repl
Q: What are your options if you are unable to upgrade or refresh your current products before EOS?
A: You can request a Support Extension. Support Extensions are available for Customers who are unable to migrate to a supported version, release or appliance platform prior to EOS. For more information, visit the IBM
Q: How do you stay connected for future product announcements?
A: There are several ways to receive product announcements:
Q: How can you connect with IBM Security on social media?
Q: Where can you find more information on IBM Support policies?
A: You can view and download the IBM
The IBM Support Lifecycle Policy sets forth the minimum length of time IBM will provide security content and technical support for a product version and release. Click the applicable product segment link below to view the Support Lifecycle Policy.
Ori Pomerantz has just published a new tutorial on developerWorks describing how to incorporate Google's reCAPTCHA tool into your node.js application running on Bluemix. He shows you step by step how to integrate with the Google service and provides sample code that you can download and use as a starting point for your own projects.
Rahul Relan, Nnaemeka Emejulu, and Parag Gokhale have just published a ne
Ori Pomerantz has written a new tutorial on multi-factor authentication in the context of a node.js application running on Bluemix. If you need a step by step guide that wlks you through a simple example of implementing multifacotr auth, this is a good tutorial for you to check out. One of the added bonuses in this tutorial is that it also introduces you to the concept of risk analysis for deciding when an additional authentication factor is needed. It's a very simple example, but sometimes it's the simple examples that help clarify your thinking the most and give you a starting point for your own code.