Close X

Determining who's using what network encryption on your z/OS system: zERT to the rescue!


Presentation

Determining who's using what network encryption on your z/OS system: zERT to the rescue!
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session describes a new z/OS V2R3 Communications Server feature called z/OS encryption readiness technology (zERT) that provides the the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
(FE)

Stream: Enterprise Security
Room: Melbourne
Time: 16:30 - 17:30

Attachments

zOS CS zERT-GSE-Fall 2017.pdf

Speakers


  • Jerry Stevens at IBM USA
  • Jerry Stevens is a senior technical staff member with IBM Systems and works in Enterprise Networking Solutions Architecture Strategy and Design with a focus on communications hardware architecture. He has more than 30 years of experience with z/OS network communications.


    Email: sjerry@us.ibm.com

  • Jerry Stevens at IBM USA
  • Jerry Stevens is a senior technical staff member with IBM Systems and works in Enterprise Networking Solutions Architecture Strategy and Design with a focus on communications hardware architecture. He has more than 30 years of experience with z/OS network communications.


    Email: sjerry@us.ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!