IBM Security Z Security

IBM Security Guardium for S-TAP Overviews (April 2, 2020) 

Wed April 08, 2020 04:22 PM

Recent user group in Turkey for z customers was hosted by IBM and Rocket Software. Due to the COVID quarantine, the meeting was held by Webex and recorded. 

As these sessions were 15-20 minutes each, we thought they might be valuable for all z/OS customers to see some of the capabilities. The Webex recordings were edited to remove some administrative stuff at the beginning and ending of each presentation and to crop out the video's of the individuals attending the sessions. 

Video 1
IBM Security Guardium S-TAP for IMS (April 2, 2020)
Overview of S-TAP for IMS by Thomas Esser  Solutions Architect, Rocket Software. While the IBM Security Guardium appliance securely stores audited data for analytics, reporting, and compliance workflow automation, S-TAP for IMS is a mainframe probe that collects the data for the appliance. Enabled for zIIP processing, extensive filtering is available to optimize volumes and performance.
 


Video 2
IBM Security Guardium S-TAP for Db2 (April 2, 2020) 
Overview of S-TAP for Db2 by Roy Panting, CTO, IBM Security Guardium for z/OS. While the IBM Security Guardium appliance securely stores audited data for analytics, reporting, and compliance workflow automation, S-TAP for Db2 is a mainframe probe that collects the data for the appliance. Enabled for zIIP processing, extensive filtering is available to optimize volumes and performance.
 

Video 3
IBM Security Guardium S-TAP for Datasets (April 2, 2020) 
Overview of S-TAP for Datasets by Julie Bergh (IBM Champion), Sr. Solutions Advisor, Rocket Software. While the IBM Security Guardium appliance securely stores audited data for analytics, reporting, and compliance workflow automation, S-TAP for Datasets is a mainframe probe that collects the data for the appliance. Enabled for zIIP processing, extensive filtering is available to optimize volumes and performance.

#Guardium

Statistics

1 Favorited
22 Views
0 Files
0 Shares
0 Downloads

Comments

Thu April 09, 2020 09:33 AM

Thanks Jim. The content is very timely when hacking is on the overdrive taking advantage of the current situation. From watching these videos, it is also clear why RACF and other identity management software is necessary but not sufficient for securing sensitive data on IBM Z.

Thu April 09, 2020 09:32 AM

James, this is great content. Thank you for sharing with our community members.