How can you ensure your z/OS network traffic is properly protected? zERT has the answer!
As you extend your Pervasive Encryption for IBM Z® strategy to your z/OS network traffic, it is imperative to assess and understand the quality of the cryptographic network protection being applied to your z/OS workloads. But with so many security protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This video introduces the z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the the data that you need to build a complete picture of your z/OS cryptographic network protection posture.