Tools for Managing Big Data Analytics on z/os

Size: px
Start display at page:

Download "Tools for Managing Big Data Analytics on z/os"

Transcription

1 Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID Test link:

2 Introduction Heterogeneous Analysis Addressing the process of packaging and transferring z/os based information to an off-board analytic platform in an Effective, Cost-efficient and Secure manner. What are some major hurdles that exploitation of advanced System z facilities can overcome in this venue? 2

3 Introduction Heterogeneous Analysis Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian mode numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection Data Volume Total raw size Number of exchanges 3

4 4 Finding the Sweet Spot

5 5 What is the business impact of selected designs and facilities?

6 Focus on experiences with System z Facilities that help address two areas Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection - Encryption Data Volume Hardware Assisted Compression Total raw size Number of exchanges 6

7 Data Protection Data-Centric Encryption using ICSF Machine z10- EC 2097 z10- BC 2098 z z zec zbc Algorithm Supported DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES AES128, 192, 256 AES128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 Crypto Hardware CPACF CEX2C CPACF CEX2C CPACF CEX3C CPACF CEX3C CPACF CEX3C CPACF CEX3C CEX3C CEX3C CEX4C CEX4C 7

8 Application Design Cryptographic Design Influences Data Exchange Format Collection with associative constructs Data Transport (Container Format) In-flight and at rest security Authentication and decryption service availability Cryptographic Identity and Associated Key Management Dynamic vs. Static Keys Inter-system Key Coordination Data Recovery (Contingency Keys) Resource Capacity Timeliness of service 8

9 9 Key Exposures The need for Key Management

10 Crypto Facilities ICSF CKDS & PKDS RACF/ACF2/Top Secret Proprietary Certificate Store OpenPGP Keyrings Application Services LDAP Administration Certificate Cryptographic CEXnC / CPACF / Software Crypto X.509 Certificates Public Certificate Authority Native X.509 Certificates 10

11 Data-Centric Encryption ICSF Data Encipherment Algorithms RSA PKi Encryption Losing ground for longevity due to high cost of processing increased key lengths Symmetric Clear Key DES class, AES ( bit key strength) May be employed with passphrase-generated key or CKDS stored key Symmetric Protected Key (SYMCPACFWRAP) CKDS Secure Key 11

12 Symmetric Key Operational Comparison Clear Fast, but Risky Protected Fast & Secure Secure Slow o o ICSF Software -or- System z CPACF o System z CPACF o Cryptographic Card o o Passphrase Value -or- ICSF CKDS Registered (clear) o ICSF CKDS Registered (encrypted) o ICSF CKDS Registered (encrypted) 12

13 13 Leverage ICSF CKDS to Protect Passphrase Derived Keys

14 14 Illustrate Registered ICSF CKDS Key Set

15 15 CKDS Policy Control Duplicate Key Value Protection

16 RACF key ring/certificate with PKDS Label:MSTEBNERSHARETEST ç RACF Label (r_datalib API access) Certificate ID:2QPVweLV4uPFwtXF2fLw8P1A Status:TRUST Start Date:2013/12/17 19:00:25 End Date: 2014/01/18 19:00:24 Serial Number:10F0F1FF3C718DEE4D24BBEDA47A49D0 Issuer's Name:CN=UTN-USERFirst-Client Authentication and .OU=http: // USERTRUST Network.L=Salt Lake City.SP=UT.C=US Subject's Stebner.OU=Corporate Secure .OU=Issued through PKWARE E-PKI Manager.O=PKWARE.648 N PL ANKINTON AVE.L=MILWAUKEE.SP=WI C=US Key Usage:HANDSHAKE Key Type:RSA Key Size:2048 Private Key:YES PKDS Label:SHARE2014MSTEBNER ç ICSF PKDS Label (implied access) 16

17 17 What is the business impact of selected designs and facilities?

18 Inherited OpenPGP Data Flow Encryption Layer Compression Layer Literal Data Layer 18

19 Consider the Basic Data Flow Simple copies from phase to phase 19

20 20 Understand OpenPGP Internal Stream Formatting (RFC 2440 or 4880)

21 OpenPGP Data Flow Overhead Additional data manipulation logic from phase to phase 21

22 Illustration of Container Format Influence on Encipherment Facilities Symmetric Keys X.509 Certificates OpenPGP RACF/ACF/CA-TSS ICSF PKDS ICSF CKDS FIPS GOOD WORK REQUIRED NOT AVAILABLE 22

23 Compression Why is it important? Data acquisition APPLICATION SERVICES GCP/ ziip/zedc Result: Compressed & Encrypted Data on Target Platform Data is offloaded, encrypted, and compressed. 23

24 What Compression Facilities are Available on System z? Software-based General CP (e.g. gzip, OpenPGP, PKZIP, zlib) Any viable cross-platform compatible algorithm chosen for implementation Deflate (RFC1951) is a commonly used algorithm that combines LZ77 sliding dictionary compression with Huffman coding. Software using ziip offload Execute software routines on a System z9 or later Requires APF authorization to run SRB enclave scheduling Provides economic compression, but may not improve latency performance. 24

25 What Compression Facilities are Available on System z? Hardware-based System z CMPSC Static Dictionary hardware compression Available since the early 1990 s Static dictionary LZ77 Limited applicability outside of z/os System z Enterprise Data Compression hardware New with zec12 and zbc12 systems PCIE adapter card Implements Deflate algorithm 25

26 Compression Facility Functional Comparison Software General CP Software on ziip CMPSC Static Dictionary zedc Portable Generalized Compression Requirements General CP Capacity System z9 ziip Capacity (APF) Pre-defined data structures zec12/zbc12 z/os 2.1 zedc Card GOOD WORK REQUIRED NOT AVAILABLE 26

27 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (I) IBM Announcement; Document Number: ZSB03059USEN Implements RFC 1951 Deflate compression When zlib uses zedc, there can be up to 118X reduction in CPU and up to 24X throughput improvement One or more PCIE cards servicing multiple partitions (15) Currently supported only under a native z/os LPAR Check IBM statements of direction Optimized for larger amounts of data Has configurable minimum size limits (4k floor) PTFs available for z/os 1.12 and 1.13 to inflate Also see SMP/E FIXCAT(IBM.Function.ZEDC) 27

28 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (III) System Use Cases SMF Phased Roll-out intentions BSAM/QSAM (infrastructure layer) DFSMSdss /DFSMShsm backup/restore z/os Java Technology Edition, Version 7 Detailed SHARE sessions 15209: Experiences with IBM zaware and zedc 15099: zenterprise Data Compression: What is it and How Do I Use it? (Wed. 4:30 PM) 15080: z/os zenterprise Data Compression Usage and Configuration 28

29 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (IV) z/os V2R1.0 MVS Callable Services for HLL (Ch ) Deflate stream compatible with GZIP, PKZIP, OpenPGP Hardware availability checks to determine availability IBM-provided compatible C library functions APF Authorized API for single-block compress/inflate Unauthorized zlib interface (streaming data) 29

30 IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (V) z/os V2R1.0 MVS Callable Services for HLL (Ch ) Unauthorized zlib interface (streaming data) Uses zlib.net z_stream programming interface (subset) Raw Deflate Stream or GZIP modes (CRC32 with GZIP) libzz.a include wrapper Controlled by SAF-protected FACILITY class resource FPZ.ACCELERATOR.COMPRESSION z/os UNIX _HZC_COMPRESSION_METHOD environment control variable May fall back to zlib software routines depending on zedc requirements, including size limitations PARMLIB IQPPRMxx DEFMINREQSIZE (4K) and INFMINREQSIZE (16K) 30

31 IBM zenterprise Data Compression PKWARE Early Test Program Experience Objective Assess compression using software GCP, ziip and zedc zec12 5 General CPs, 2 ziips, 1 zedc Workloads Single system (no LPAR sharing of zedc) Large (1gb+) linear with multiple parallel (80 concurrent) Small (256k) high volume Metrics Elapsed Time Processor time 31

32 zedc Operations Console Display General PCIE Status 32

33 zedc Operations Display zedc PCIE Adapter Status 33

34 34 zedc Operational Monitoring (II)

35 zedc Processing Characteristics Multi-tasking with the zlib API is available zlib API may not run on the zedc hardware (per design) Different minimum buffer size thresholds for deflate & inflate Only one level of zedc Deflate compression 9 levels available in zlib software Internal implementations of RFC 1951 Deflate may differ May experience varying compression ratios (based on level) right around the minimum buffer size restriction. 35

36 IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (I) zedc sustained 1gb+ per second of raw compression zedc capacity exceeded application resource constraints The affects of I/O and application processing prevented saturation of zedc Under appropriate conditions, ziip met or exceeded application performance when compared to zedc. Optimized zlib C routines showed benefits over the libzz.a wrapper code under some conditions. Small files under the minimum buffer size Inflation 36

37 IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (II) ETP limitations of first implementation identified Buffer allocation issues Buffer release Rejected concurrent requests for the same size buffer Compression ratio (77% vs. 89% for software implementations) 37

38 38 Effect of Resource Availability zedc vs. ziip

39 39 Incorporate Design with Facility Transactional Example (1.5mb each)

40 Summary Slide The Mainframe is typically the source of record for critical business data Data needs to move off the mainframe quickly, efficiently and securely. Numerous facilities on z/os exist to make this quick, efficient and secure ziip, CryptoExpress4S, CPACF, zedc Proper Transformation is critical to reduce hardware dependencies and facilitate long term viability 40

Sharing Secrets Using Encryption Facility

Sharing Secrets Using Encryption Facility Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety

More information

A guide for creating a more secure, efficient managed file transfer methodology

A guide for creating a more secure, efficient managed file transfer methodology Sterling Connect:Direct & SecureZIP A guide for creating a more secure, efficient managed file transfer methodology JOE STURONAS CHIEF TECHNOLOGY OFFICER, PKWARE FORREST RATLIFF SOLUTIONS ENGINEER, PKWARE

More information

Securing Data At Rest And Data In Motion - Strategic Data-Centric Security. 9 th March 2012

Securing Data At Rest And Data In Motion - Strategic Data-Centric Security. 9 th March 2012 Securing Data At Rest And Data In Motion - Strategic Data-Centric Security 9 th March 2012 PKWARE Main Benefits Setting The Scene Project Management Triangle Scope Time Cost Security Triangle Security

More information

Configuring and Tuning SSH/SFTP on z/os

Configuring and Tuning SSH/SFTP on z/os Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies info@dovetail.com dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link

More information

Crypto and Disaster Recovery. Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com

Crypto and Disaster Recovery. Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com Crypto and Disaster Recovery Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com October 2014 Agenda Crypto and Disaster Recovery How Do You Do DR? Technology Hardware Domains Master Keys Restoring

More information

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! System z Batch Network Analyzer Tool (zbna) - Because Batch is Back! John Burg IBM March 5, 2015 Session Number 16805 Insert Custom Session QR if Desired. Trademarks The following are trademarks of the

More information

Encryption Facility for z/os Version 1.10

Encryption Facility for z/os Version 1.10 Front cover Encryption Facility for z/os Version 1.10 Principles of operations and options explained Examples of setup and use of all the features Expert considerations and recommendations Patrick Kappeler

More information

z/os Cryptographic Services - ICSF Best Practices

z/os Cryptographic Services - ICSF Best Practices z/os Cryptographic Services - ICSF Best Practices Steven R. Hart, CISSP IBM Thursday, August 7, 2014: 8:30 AM-9:30 AM Session Number 15775 Insert Custom Session QR if Desired. Topics Cryptography Basics

More information

PKI Services: The Best Kept Secret in z/os

PKI Services: The Best Kept Secret in z/os PKI Services: The Best Kept Secret in z/os Wai Choi, CISSP IBM Corporation August 7th, 2014 Session: 15773 Trademarks The following are trademarks of the International Business Machines Corporation in

More information

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 IBM eserver The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005 Wai Choi IBM Corporation RACF Development Poughkeepsie, NY Phone: (845) 435-7623 e-mail: wchoi@us.ibm.com

More information

End-to-End Enterprise Encryption:

End-to-End Enterprise Encryption: End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP:

More information

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: wchoi@us.ibm.com 1 Trademarks

More information

PKZIP /SecureZIP for z/os

PKZIP /SecureZIP for z/os PKZIP /SecureZIP for z/os System Administrator s Guide SZZSA- V111R0002 PKWARE Inc. PKWARE, Inc. 648 N Plankinton Avenue, Suite 220 Milwaukee, WI 53203 Main office: 888-4PKWARE (888-475-9273) Sales: 937-847-2374

More information

Mainframe. Large Computing Systems. Supercomputer Systems. Mainframe

Mainframe. Large Computing Systems. Supercomputer Systems. Mainframe 1 Large Computing Systems Server Farm Networked cluster of interchangeable file/application servers Provides load balancing for availability and reliability Blade Server Server farm in a single cabinet

More information

10195 Crypto And Disaster Recovery

10195 Crypto And Disaster Recovery Crypto And Disaster Recovery Greg Boyd (boydg@us.ibm.com) Atlanta, GA Permission is granted to SHARE to publish this presentation in the SHARE Proceedings. IBM retains its right to distribute copies of

More information

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher

More information

DOAG 2014. 18.November 2014. Hintergrund. Oracle Mainframe Datanbanken für extreme Anforderungen

DOAG 2014. 18.November 2014. Hintergrund. Oracle Mainframe Datanbanken für extreme Anforderungen DOAG 2014 18.November 2014 Hintergrund zu Oracle Mainframe Datanbanken für extreme Anforderungen Dr. Manfred Gnirss Senior IT Specialist IBM Client Center, IBM Germany Lab gnirss@de.ibm.com Die folgenden

More information

Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance

Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP

More information

Secure Database Backups with SecureZIP

Secure Database Backups with SecureZIP Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011

Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: wchoi@us.ibm.com 1 Trademarks

More information

ZIP/390 : Application Programming Interface. MVS et VSE

ZIP/390 : Application Programming Interface. MVS et VSE Avec les APIs ZIP/390, tout programmeur se retrouvera aisément dans les exemples ci-après. Quelques exemples en Assembleur, COBOL et CICS Compression en ASSEMBLER MVS et VSE ACTION=ZIP Compression «ZIP390.FILE1.TXT»

More information

Benefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data

Benefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data Benefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data Joe Sturonas, Mike Stebner PKWARE, Inc. March 12, 2014 14875 Test link: www.share.org

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: comera@us.ibm.com February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The

More information

Licensed Programming Specifications

Licensed Programming Specifications Licensed Programming Specifications IBM DB2 10 for z/os Program number 5605-DB2 IBM DB2 10 for z/os is a relational database management system licensed program for the z/os environment. In this document,

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

CICS Transactions Measurement with no Pain

CICS Transactions Measurement with no Pain CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS

More information

GPU File System Encryption Kartik Kulkarni and Eugene Linkov

GPU File System Encryption Kartik Kulkarni and Eugene Linkov GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through

More information

Security Intelligence, Audit and Compliance for the Mainframe

Security Intelligence, Audit and Compliance for the Mainframe Security Intelligence, Audit and Compliance for the Mainframe Rich Skinner, CISSP Brinqa Director of Risk Analytics & Big Data rskinner@brinqa.com August 15, 2013 Session: 13722 Agenda Today s Security

More information

z/os Communications Server Security Using Policy Agent

z/os Communications Server Security Using Policy Agent z/os Communications Server Security Using Policy Agent Session 17787 Thursday 8/13 Southern Hemisphere 5 at 3:15pm Insert Custom Session QR if Desired Linda Harrison lharriso@us.ibm.com Trademarks The

More information

Big Data Storage in the Cloud

Big Data Storage in the Cloud Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while

More information

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills bonett@us.ibm.com 1 Corporation Trademarks

More information

CA Big Data Management: It s here, but what can it do for your business?

CA Big Data Management: It s here, but what can it do for your business? CA Big Data Management: It s here, but what can it do for your business? Mike Harer CA Technologies August 7, 2014 Session Number: 16256 Insert Custom Session QR if Desired. Test link: www.share.org Big

More information

Oracle Database 11g Comparison Chart

Oracle Database 11g Comparison Chart Key Feature Summary Express 10g Standard One Standard Enterprise Maximum 1 CPU 2 Sockets 4 Sockets No Limit RAM 1GB OS Max OS Max OS Max Database Size 4GB No Limit No Limit No Limit Windows Linux Unix

More information

IBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations

IBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations Redpaper IBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations Axel Buecker William C. Johnston Overview This IBM Redpaper publication discusses IBM Security Key Lifecycle

More information

Aktuelles aus z/vm, z/vse, Linux on System z

Aktuelles aus z/vm, z/vse, Linux on System z Dr. Klaus Goebel IBM Research & Development, Böblingen, kgoebel@de.ibm.com Aktuelles aus z/vm, z/vse, Linux on System z z/vse z/vm Frühjahrstagung 2014, Frankfurt, 7.-9. April 2014 Trademarks The following

More information

Virtual Machines. www.viplavkambli.com

Virtual Machines. www.viplavkambli.com 1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software

More information

How-to Access RACF From Distributed Platforms

How-to Access RACF From Distributed Platforms How-to Access RACF From Distributed Platforms Saheem Granados IBM Wednesday, February 6, 2013 12538 sgranado@us.ibm.com Trademarks The following are trademarks of the International Business Machines Corporation

More information

Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.

Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user. Secure your data. Wherever it is, Wherever it goes, However it gets there......on all major platforms. For every user. SecureZIP Product Family SecureZIP products are designed as enterprise-class, data-centric

More information

CA TPX Session Management r5.3

CA TPX Session Management r5.3 PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end

More information

Getting Started with Digital Certificates Part II (RACDCERT)

Getting Started with Digital Certificates Part II (RACDCERT) Getting Started with Digital Certificates Part II (RACDCERT) 1 This presentation will guide you through the RACF s world of Digital Certificates. We will attempt to explain how they can be used and how

More information

Karmjeet Kahlon Director Global z Systems Software Sales

Karmjeet Kahlon Director Global z Systems Software Sales Karmjeet Kahlon Director Global z Systems Software Sales The market is moving, forcing businesses to transform Explosion in transaction growth driven by mobility and the Internet of Things Analytics is

More information

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and

More information

SkyRecon Cryptographic Module (SCM)

SkyRecon Cryptographic Module (SCM) SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.

More information

New CICS support for Secure Sockets Layer

New CICS support for Secure Sockets Layer New CICS support for Secure Sockets Layer Peter Havercan, Senior CICS Developer CICS Transaction Server has had support for Secure Sockets Layer (SSL) since Version 1 Release 3, but the support has been

More information

ERserver. iseries. Securing applications with SSL

ERserver. iseries. Securing applications with SSL ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users

More information

Mainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA)

Mainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA) Mainframe alternative Solution Brief MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA) Mainframe alternative Solution Brief MFA Sizing Study for a

More information

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

IBM z13 Software Pricing Announcements

IBM z13 Software Pricing Announcements IBM z13 Software Pricing Announcements - IBM Collocated Application Pricing (ICAP) - Country Multiplex Pricing - Technology Update Pricing for z13 January 14, 2015 IBM z13 Software Pricing Announcements

More information

INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003

INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003 INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003 History of Cryptography The concept of securing messages through cryptography has a long history.

More information

Frequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent

Frequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent Frequently sked uestions (Fs) United Computer Group, Inc. VULT400 System i (S/400) gent Revised September 2013 VULT400 System i (S/400) gent F What are the key benefits of VULT400 ISeries gent when compared

More information

Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries

Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries January 2013 YOUR DOCUMENT MANAGEMENT SOLUTION Real Vision Imaging Use a Proxy Server to Connect Your IBM i to the Web Real Vision Software, Inc. P.O. Box 12958 Alexandria, LA 71315-2958 3700 Jackson Street

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity

More information

zpcr Capacity Sizing Lab Part 2 Hands-on Lab

zpcr Capacity Sizing Lab Part 2 Hands-on Lab Advanced Technical Skills (ATS) North America zpcr Capacity Sizing Lab Part 2 Hands-on Lab SHARE - Session 9667 August 11, 2011 John Burg Brad Snyder Materials created by John Fitch and Jim Shaw IBM 50

More information

FDRSOS (Safeguard Open Storage)

FDRSOS (Safeguard Open Storage) Introducing FDRSOS (Safeguard Open Storage) FDRSOS (Safeguard Open Storage) provides high-speed, reliable backups of Open Systems (SCSI) data to an MVS or OS/390 System. FDRSOS and the SYMMETRIX 3000 and

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

Implementing SSL Security on a PowerExchange 9.1.0 Network

Implementing SSL Security on a PowerExchange 9.1.0 Network Implementing SSL Security on a PowerExchange 9.1.0 Network 2012 Informatica Abstract This article describes how to implement SSL security on a PowerExchange network. To implement SSL security, configure

More information

CA Integrated Agent Services

CA Integrated Agent Services CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred

More information

Cryptography and Network Security Chapter 15

Cryptography and Network Security Chapter 15 Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North

More information

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. Presented by Richard Marko, Manager of Technical Services Sponsored by Midland Information Systems,

More information

CA s Cloud Storage for System z

CA s Cloud Storage for System z CA s Cloud Storage for System z Michael Melillo Sr. User Experience Architect Cloud Solutions for System z April 15 th, 2014 2013 CA. All rights reserved. Disclaimer Certain information in this presentation

More information

IBM Software Group. Lotus Domino 6.5 Server Enablement

IBM Software Group. Lotus Domino 6.5 Server Enablement IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months

More information

Experiences with Using IBM zec12 Flash Memory

Experiences with Using IBM zec12 Flash Memory Experiences with Using IBM zec12 Flash Memory Session 14119 August 13, 2013 Mary Astley ATS - IBM Corporation 2013 IBM Corporation Trademarks The following are trademarks of the International Business

More information

z/tpf FTP Client Support

z/tpf FTP Client Support z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf FTP Client Support Name: Jason Keenaghan Venue: Main Tent AIM

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage

The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The IBM zenterprise EC12 (zec12) server introduces the Flash Express feature (FC 0402) that provides a new PCIe

More information

Encryption? Yeah, We Do That. Encryption facilities, challenges, and choices on System z

Encryption? Yeah, We Do That. Encryption facilities, challenges, and choices on System z Encryption? Yeah, We Do That Encryption facilities, challenges, and choices on System z Agenda Tour System z encryption facilities Survey available IBM products Briefly discuss third-party technologies

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute

More information

Version 14.0. Overview. Business value

Version 14.0. Overview. Business value PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.

More information

CA Insight Database Performance Monitor for DB2 for z/os

CA Insight Database Performance Monitor for DB2 for z/os PRODUCT SHEET CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os (CA Insight DPM)

More information

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman. Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12. Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

Contingency Access to Enterprise Encrypted Data

Contingency Access to Enterprise Encrypted Data T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents No option to escrow Passphrase protection zseries example Incorporating contingency key in zseries Windows command line example Incorporating

More information

Running Oracle Databases in a z Systems Cloud environment

Running Oracle Databases in a z Systems Cloud environment Running Oracle Databases in a z Systems Cloud environment Sam Amsavelu samvelu@us.ibm.com ISV & Channels Technical Sales - Oracle IBM Advanced Technical Skills (ATS), America Technical University/Symposia

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

The Truth Behind IBM AIX LPAR Performance

The Truth Behind IBM AIX LPAR Performance The Truth Behind IBM AIX LPAR Performance Yann Guernion, VP Technology EMEA HEADQUARTERS AMERICAS HEADQUARTERS Tour Franklin 92042 Paris La Défense Cedex France +33 [0] 1 47 73 12 12 info@orsyp.com www.orsyp.com

More information

Maximizing Hadoop Performance and Storage Capacity with AltraHD TM

Maximizing Hadoop Performance and Storage Capacity with AltraHD TM Maximizing Hadoop Performance and Storage Capacity with AltraHD TM Executive Summary The explosion of internet data, driven in large part by the growth of more and more powerful mobile devices, has created

More information

FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0) FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:

More information

PGP from: Cryptography and Network Security

PGP from: Cryptography and Network Security PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter

More information

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database

More information

Digital Certificate Goody Bags on z/os

Digital Certificate Goody Bags on z/os Digital Certificate Goody Bags on z/os Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 6 th, 2012 Session 11623 Agenda What is a Digital Certificate?

More information

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 Comodo CA, Ltd. ECC Certificate Addendum to Comodo EV CPS v. 1.03 6 March 2008 3rd Floor, Office Village, Exchange Quay,

More information

Driving force. What future software needs. Potential research topics

Driving force. What future software needs. Potential research topics Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #

More information

IBM Mainframe Services. 10 April 2014. G-Cloud. service definitions

IBM Mainframe Services. 10 April 2014. G-Cloud. service definitions IBM Mainframe Services 10 April 2014 G-Cloud service definitions TABLE OF CONTENTS Definitions and Interpretation... 4 The Services... 6 Core Services... 6 Optional Services... 8 Additional Services...

More information

Memory Resource Management in VMware ESX Server

Memory Resource Management in VMware ESX Server Memory Resource Management in VMware ESX Server Carl Waldspurger OSDI 02 Presentation December 10, 2002 Overview Context Memory virtualization Reclamation Sharing Allocation policies Conclusions 2 2 Motivation

More information

CA MICS Resource Management r12.7

CA MICS Resource Management r12.7 PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information

More information

Cross-Platform Access

Cross-Platform Access Virtualize Cross-Platform Access to Protect Linux on System z Data Copyright 2010 INNOVATION Data Processing. All rights reserved. 1 Purpose This session will offer through interactive discussion the opportunity

More information

DB2 Security and PCI Compliance

DB2 Security and PCI Compliance DB2 Security and PCI Compliance A BEST PRACTICES GUIDE Ulf T. Mattsson, Chief Technology Officer, Protegrity Corporation. INTRODUCTION THE PAYMENT CARD INDUSTRY (PCI) DATA SECURITY STANDARD PCI is a set

More information