IBM Security Z Security

zSecurity.jpg

This online user group is intended for Z Security product users to communicate with IBM experts, share advice and best practices with peers and stay up to date regarding product enhancements, regional user group meetings, webinars, how-to blogs and other helpful materials.

We invite you to participate and ask you to contact Community Managers Jennifer Tullman-Botzer and Wendy Batten with any questions.

Z Security Resources

Latest Discussions

  • Thanks Rob for the response, if there is no current support then that saves me the hassle of attempting! I'd most be interested in cross-referencing the related CKXLOG record to find the potential "why" on a command was issued, but in lieu of that support ...

  • Hi Rene Thank you very much. It worked perfectly. Best Regards ------------------------------ Joao Bentes Jesus ------------------------------

  • Hi joao Specifying /* results in a CARLa query like this s c=user KEY=CRMBANY s=workattr waaccnt=/* where /* means start of a comment so the rest of the query isnt processed. This can be avoided by specifying '/*'g but unfortunately the user ...

Latest Blogs

  • By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young ...

    1 person recommends this.
  • PP. 73-82 in the I&D Guide for ZSecure mentions Access Monitor commands. It gives no indication of how these commands are executed. They do not work as parameters of the MODIFY C2PACMON command. There is a reference to "Operator commands" but these ...

  • Increased remote work and digital footprints over the last year have accelerated the importance of cybersecurity in our world. Although breaches remain costly and time-consuming, the 2020 Cost of a Data Breach Report reveals that preparedness yields ...

  • On December 14, 2020 a new service stream enhancement (SSE) to zSecure 2.4 has become generally available, providing a.o. additional compliance automation, several usability enhancements, and a number of new report types. Background Mainframes continue ...

    1 person recommends this.
  • Useful Links on zsecurity available for z customers: link to workshop lab guides and webinars: https://ibm.box.com/v/zSecure-webinar Recorded webinars about all the zsecure modules , included audit, visual and Guardium on zOS (included a recorded ...

Latest Files