We exist in a constantly changing threat environment. As the threats evolve, the security solutions, best practices, industry standards and regulatory compliance must also evolve to keep up with the threat landscape. For many organizations, this means continuing to enhance the security of their mainframe production systems, while at the same time adapting to handle new business initiatives including cloud, mobile, and big data. Some of these key customer challenges in the mainframe environment include:

  • Integrating mainframe security intelligence in with enterprise-wide security intelligence
  • Protecting sensitive enterprise data when used in big data and cloud environments
  • Provided automated reporting for compliance regulations and industry standards
  • Allowing secure access by users with mobile and personal device access
  • Securing and isolating consolidated virtual consolidated workloads and clouds

Let’s take a closer look at these five challenges:

1. Enhanced Mainframe Security Intelligence

Today mainframe threats are often detected, isolated, analyzed and handled in separate silos by mainframe specific products. This can prevent an organization from seeing the bigger picture or identifying broader enterprise-wide vulnerabilities. Consolidating mainframe security threats in with overall organization threats can help to analyze trends, pinpoint sources, and lead to timely efficient enterprise-wide threat responses that minimize damage.

2. Protecting Sensitive Data

Sensitive personal and critical business data must be adequately protected, especially as we find new ways to use the information in cloud environments and big data analytics. Data can be protected at various levels:  field level, tables, files, storage devices, etc. in various ways: access controls, masking, encryption, network communications, etc. Estimates show that up to 70% of corporate production data may reside on mainframes especially for mission critical production workloads. Mainframes continue to offer strong security and privacy solution enhancements to protect data at rest and in motion.

3. Automated Compliance Reporting

With each new wave of threats and breach disclosures, there are expanded industry standards and compliance regulations. For instance retail breaches result in extension to the Payment Card Industry standards that protect our charge card information from identity theft and consumer fraud. Each round of stiffer regulations come with greater penalties and fines and requirements for more comprehensive compliance reporting. Solutions that can provide dashboard summaries of security status can automate compliance reporting to reduce audit overhead and costs.

4. Secure Personal and Mobile Devices Computing

As employees and customer consumers utilize their personal devices for work,  we require better security to understand  the level of trust in the user mobile device context. For instance did they provided strong  user authentication such as digital certificates for secure communication protocols? Does their mobile device provide encryption of sensitive data stored on the device to prevent data disclosure? Is their device compliant with current patches and corporate security guidelines.

5. Virtual Workloads and Cloud Computing

When running virtual machines and private cloud workloads, you need isolation of the workloads, as though they were running on unconnected dedicated machines, and that can prevent data leakage between workloads. Mainframes offer a number of secure ways to run virtual machine workloads while providing isolation of users, applications and data including logical partitions, virtual machine system z/VM, and blade servers. In fact mainframe LPARs are evaluated at EAL5+, the highest commercial evaluation available today.

With greater than 45 years of integration between hardware and software, IBM System z servers and security software must continually evolve to provide a secure, integrated infrastructure for your mission critical production, cloud, web, mobile and big data applications in this constantly changing threat environment. On July 23, IBM announced a number security enhancements for encryption, digital certificates, security intelligence analytics, compliance reporting, data base auditing, and more that can help you keep up with the changing threat environment on mainframes.

How can your organization utilize more effective security intelligence to deal with the changing threats? How can you automate reporting of your compliance posture? And how do you protect your mission critical and sensitive data while allowing mobile devices access?

Read the IBM z/OS Version 2 Release 1 announcement

Read the IBM Security zSecure V2.1 announcement


More from Intelligence & Analytics

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Despite Tech Layoffs, Cybersecurity Positions are Hiring

4 min read - It’s easy to read today’s headlines and think that now isn’t the best time to look for a job in the tech industry. However, that’s not necessarily true. When you read deeper into the stories and numbers, cybersecurity positions are still very much in demand. Cybersecurity professionals are landing jobs every day, and IT professionals from other roles may be able to transfer their skills into cybersecurity relatively easily. As cybersecurity continues to remain a top business priority, organizations will…

4 min read

79% of Cyber Pros Make Decisions Without Threat Intelligence

4 min read - In a recent report, 79% of security pros say they make decisions without adversary insights “at least the majority of the time.” Why aren’t companies effectively leveraging threat intelligence? And does the C-Suite know this is going on? It’s not unusual for attackers to stay concealed within an organization’s computer systems for extended periods of time. And if their methods and behavioral patterns are unfamiliar, they can cause significant harm before the security team even realizes a breach has occurred.…

4 min read

Why People Skills Matter as Much as Industry Experience

4 min read - As the project manager at a large tech company, I always went to Jim when I needed help. While others on my team had more technical expertise, Jim was easy to work with. He explained technical concepts in a way anyone could understand and patiently answered my seemingly endless questions. We spent many hours collaborating and brainstorming ideas about product features as well as new processes for the team. But Jim was especially valuable when I needed help with other…

4 min read