Stream: Large Systems
Time: 12:30 - 13:15
Modernizing z/VM security practices, with APIs, can create an effective end-to-end secure infrastructure. In this session, explore how to limit user access, develop rules for user logon, and implement automated tasks through efficient workflow processes. As security initiatives tighten, z/VM environments must enhance their risk management and intrusion avoidance. APIs can open up new strategies to automate, protect, and respond.
There is currently no attachment for Discover a New Level of Security Through an Open z/VM Architecture
Brian Jagos: Broadcom (formally CA Technologies): joined TSC around 2009. Worked with VM since 2000, and since that time I have been the face of z/VM to Broadcom customers and internally to product management, marketing, and development. I have helped guide the development process for the z/VM direction at Broadcom. I have been a Broadcom customer facing technical resource for over 20 years. In addition to my roll with z/VM I also work on the z/OS side of the house working in areas that support testing and fault management, application performance, software change manager, and Dev/Ops. These area allow me to work with open source cutting edge technologies such as Zowe.
Click here to give some Feedback so we can make it even better next year!