Security

One reason IBM mainframes are considered more secure than other platforms is that their network security has a reliable architecture. Unfortunately, this security can be easily compromised if available tools aren’t effectively implemented. This is often the result of lack of understanding of how the security works and of what tools are available…

Read Full Article →

Early in the history of IT, the mainframe was the only system with which users performed their daily work. Today’s IT environments look different. While often there’s still a central mainframe system to perform business-critical work, most users sit in front of a PC or workstation. A user may use the mainframe to perform business tasks as well as other servers or even Internet applications such as email services, which are available on the Web…

Read Full Article →

Frameworks can be wonderful things. They help us organize how we think and communicate about complicated or ambiguous concepts. For many nontechnical people, data management seems both complicated and ambiguous. The differences between various data management functions seem unclear, and this leads to unclear accountabilities for compliance requirements and activities…

Read Full Article →

Key Terms

• State: conveys the session status of interactions between two computing devices or between a computer application and a user ID, or a service and the service client. State refers to the degree of information retained and available about ongoing communications for the duration of the session…

Read Full Article →

With the global economic slowdown and projections for a prolonged recession, funding those “must-have” IT development projects this year will be a challenge. In 2009, IT managers will be lucky to get a fraction of the resources they’ll need to keep up with their organizations’ growing information IT requirements, as many planned projects are likely to be dramatically delayed, severely cut, or eliminated outright. Not surprisingly, IT managers this year will focus on maximizing the performance and functionality of existing computing systems in any and every way possible, while avoiding situations that require additional resources…

Read Full Article →

For most data centers, disk data sets have been nice and secure for years. Today, most data centers have enabled some form of “protect all” level of security for disk data sets, so no data set can be created without a rule in place to protect it. However, just because disk data is protected doesn’t mean tape data is equally secure. Here are the four most basic aspects of security protection of a tape library:…

Read Full Article →

The best way to secure data being exchanged over an insecure network such as the Internet is to encrypt it. The Crypto Express2 (CEX2) feature for IBM System z provides cryptographic functions implemented in hardware, which otherwise must be calculated as software algorithms. The software implementation of a cryptographic algorithm is much more expensive in terms of CPU costs compared to a hardware-accelerated algorithm…

Read Full Article →

We all know the story of the cobbler’s children, who are forced to go shoeless while the cobbler makes shoes for customers. Townspeople line up to be shod with exquisite slippers, sturdy clogs, or long black boots, but the cobbler’s children are forced to brave the elements with nothing but old socks to protect their tiny, callused feet. And somehow, the story goes, they understand. “It’s OK,” the tykes whisper to sympathetic observers…

Read Full Article →

When data professionals think about regulatory compliance we tend to consider only data in our production databases. After all, it’s this data that runs our business and must be protected. So, we implement database auditing to know who did what to which data when; or, we tackle data protection initiatives to protect our data from prying eyes; or, we focus on improving data quality to ensure the accuracy of our processes…

Read Full Article →