Search for tag: "security"

QRadar SOAR: Breach Response

Breach Response Prepare for and respond to privacy breaches by integrating privacy reporting tasks into your overall incident response playbooks. Work together with privacy, HR and legal teams to…

From  chq_master_librarians

QRadar SOAR: Playbooks and Automation

Playbooks & Automation Leverage the award-winning Playbook Designer to help orchestrate and automate your response processes. Your playbook evolves as the investigation proceeds, with threat…

From  chq_master_librarians

The IBM X-Force Cyber Range Experience

IBM X-Force Cyber Ranges immerse organizations into real-world cyber simulations that help them assess their security posture and maturity for a full-business response. These gamified simulations…

From  chq_master_librarians

Guardium Insights: Data security posture management

Guardium Insights SaaS DSPM provides compliance and security teams with essential visibility and insights to help ensure your company's sensitive data is secure and compliant.Book a live demo…

From  chq_master_librarians

Remote System Network Security Credential Propagation to IMS

In a heterogeneous, distributed computing environment, the ability to preserve a user identify from one security realm to another can significantly enhance accountability and reduce vulnerabilities. …

From  5500031CVP 5500031CVP

z/OS Connect Passing Distributed Identities to IMS

This video describes OTMA z/OS Connect and distributed network security credentials. When the z/OS Connect server detects that it’s connecting to IMS Connect V15, by default, it passes the…

From  5500031CVP 5500031CVP

What is Cloud-Native Application Protection Platforms (CNAPP)?

Cloud-Native Application Protection Platforms (CNAPP) provides a toolbox of cloud security services. In this video, Janet Van explains what CNAPP is and how it can help you manage the overall…

From  chq_master_librarians

Navigating Data Residency: Essential actions for enterprise compliance

While cross-border digital exchange has become the norm, enterprises remain challenged with meeting data residency requirements set forth by various regions. Data residency is the actual location of…

From  chq_master_librarians

IBM Cybersecurity Services integrates with Microsoft Security Technology

Learn how Microsoft Intelligent Security Association (MISA) partner IBM Cybersecurity Services integrates with Microsoft Security Technology.

From  chq_master_librarians

Obtaining Documentation for a Security Audit, Part 3

This video describes: Operations Manager security options IMS automation review Security exits Data at rest

From  5500031CVP 5500031CVP

Obtaining Documentation for a Security Audit, Part 2

This video describes the following IMS PROCLIB members and the parameters associated with security settings: DFSDCxxx HWSCFG

From  5500031CVP 5500031CVP

Obtaining Documentation for a Security Audit, Part 1

This video describes: System generation input related to security IMS proclib data set members associated with security settings Transaction authorization (TRN) parameter in DFSPBxxx Sign On…

From  5500031CVP 5500031CVP

Security Facilities: Security-related Log Records

This video describes the following log records: Type X'10' Type X'16' Log records that contain the user ID for a signed-on user: Types X'01' and x'5901'…

From  5500031CVP 5500031CVP

Security Facilities: RACF

This video describes setting up RACF, including specifying the RACF resource class, which is a collection of profiles with similar characteristics, such as a collection of IMS transaction profiles.

From  5500031CVP 5500031CVP

Security Facilities: Application, Physical, and Exit Security

This video describes aspects of application-based security, such as security rules and how applications can access RACF via an AUTH call to IMS. This video also describes exits for tasks such as sign…

From  5500031CVP 5500031CVP

Security Facilities: Encryption and VSAM Password Security

This video describes database encryption and how it is performed, and VSAM password protection for IMS databases in batch environments.

From  5500031CVP 5500031CVP