IBM Security Z Security

 View Only

zSecurity.jpg

Welcome to IBM Security z Security
Join this online user group to communicate across Z Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.


As a member of this online user community, you gain:

  • Direct engagement with IBM subject matter experts
  • Tips and tricks from your industry peers
  • News, announcements, and enhancement details

You’ll also get information regarding our regional and virtual user group meetings, upcoming webinars, how-to blogs, and training. We invite you to participate and ask that you contact support@communitysite.ibm.com with any questions.

IBM Security Z Security Resources

Latest Discussions

  • I totally missed your part of the message " select profile='SYS1.*.**'c ". That solved my problem. Thanks for all the help! Brent ------------------------------ Brent Brimacomb ------------------------------

  • Hello All, The question was raised to me as to whether zSecure can be used to forward an LPAR's SYSLOG/OPERLOG to a SIEM. My response was no, but I was asked if it's part of the roadmap/future release? My inclination is in order to perform that function, ...

  • Sure. In your query: n type=dsn select profile=SYS1.*.** display complex profile dsn_type dsn I'm getting not only SYSZ.* .* * , but also getting other profiles, SYSZ.*.PROCLIB*.**, SYSZ.*.TCPPARM*.**, SYSZ.*.USER.PARMLIB*.**, SYSZ.*.USER.PARMLIB*.** ...

Latest Blogs

  • z Security Super User Group - Dallas Mainframes are no longer isolated systems and are now connected to the cloud, mobile, and web-based applications, which has increased the complexity of security management. AI can help in areas such as file ...

  • Just in time for the holidays, IBM Z Multi-Factor Authentication has GAed!! Before you take some much needed time off during this holiday season, check out some of the great features that we've added. Please reach out to me at zagorski@us.ibm.com if ...

    1 person likes this.
  • Recently IBM published the Cost of a Data Breach Report for this year, 2023 ( 1 ). This report emphasizes to enterprises the need to be better prepared for breaches by understanding their causes and the factors that increase or reduce costs. It is estimated ...

    2 people like this.
  • As we wrap up Cybersecurity Awareness Month, it wouldn’t be complete without touching on the importance of key management. The key management journey begins with the need to protect data. Data breaches continue to grab headlines and cost companies ...

    1 person likes this.
  • In my experience as cybersecurity engineer, a chief product owner for security, a threat modeling subject matter expert, and an IBM Master Inventor, “good” security hygiene is the foundation of an enterprise’s security ecosystem and can be understood ...

    3 people like this.

Upcoming Events