The primary use of the zERT data is likely to be the identification and remediation of unencrypted connections. By taking advantage of an intuitive and interactive, web-based GUI interface, network security administrators can now identify all unencrypted traffic leaving their site.
Additionally, administrators can now easily see what level of cryptographic encryption each traffic connection has, if any, and drill down by traffic classes.
View this short video demo to see how IntelliMagic Vision for z/OS TCP/IP and zERT can elevate the effectiveness of network security administrators.
To learn more about the value provided by zERT and other SMF data, please watch the full recording on Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.