Who knows more about protecting Z than Z people?
Automated detection of security exposure or misconfiguration
Repeatable, sustainable and automated process for auditing and reporting helps you be prepared for audits without having to gather the necessary information yourself. zSecure™ Audit helps you extend and enrich security by enforcing and enhancing security policies. Automatically generated reports in standard format help you to quickly locate problems, providing vulnerability analysis of your mainframe. You can reduce errors and improve overall quality of service.
Event collection from multiple products
Automated compliance framework testing and enhanced reporting capabilities for Payment Card Industry Data Security Standard (PCI DSS), Security Technical Implementation Guide (STIG), GSD331, Sarbanes-Oxley (SOX) and other standards and best practices help lower the cost of event collection from many products.
zSecure Audit can email reports on a daily basis when specific events occur or when there is a security breach. Extensive reporting capabilities allow you multiple customizable capabilities. The reports can also analyze the HTTP access and error log to see who is accessing or using data on the internal IT environment through the Internet.
Integration with SIEMs including QRadar SIEM
Audit events and user access logs generated by IBM security management tools can be populated within SIEMs including QRadar® Security Information and Event Management (SIEM) for normalization and compliance reporting, harmonizing the collection infrastructure among the product lines. This integration supports an effective, comprehensive security information and event management solution.
Scalability for big data systems
V2.2.1 allows storage above the 2 GB boundary ("the bar") to enable processing of more data. Note that the ability to use more virtual memory can have implications for paging and real storage needs. This also frees up storage below the bar for other programs. With models z196 or higher, 64-bit addressing is activated automatically, though reverting back to 31-bit addressing is optional. You can select the program to run on the second panel of menu option SE.0 (SETUP RUN).
Expert resources to help you succeed