Track 5 - Data Center Operations – Cloud and Systems Management Update
Developed for: Operations managers and system programmers
Are you being asked to support new technologies like mobile, big data and cloud? Do you have all the analytic information you need to monitor and support new workloads? Much of the data and workloads required for these technologies currently run on System z. Taking advantage of additional analytics can help support those workloads and more easily integrate System z into these new environments, while minimizing disruption of current enterprise workloads. We’ll discuss how analytics, including System z, helps successfully integrate systems of engagement with backend systems of record. Learn how analytics can improve visibility and assist in understanding the impact of adding new technologies to System z.
How can you ensure that the environment where your mission-critical business applications run has the highest availability possible, while increasing productivity across an increasingly heterogeneous System z environment? Using OMEGAMON XE with Tivoli® System Automation and Workload Automation solutions, you can automate the monitoring and management of your business applications end-to-end from a single point of control. We’ll use examples of common zEnterprise situations where having OMEGAMON and System Automation working together can proactively resolve problems.
The mainframe continues to be the ultimate security platform, with its combination of industry-leading hardware and software technology. System z is unique in providing integrated architecture, hardware, operating system, security software, data protection, network communications, and application security as a superior platform for web, cloud, mobile and data analytics. We will discuss how the IBM Security zSecure™ suite helps administrators deal with the scope and complexity of mainframe security by automating user provisioning and access control management. In this session, you’ll get an overview of mainframe security capabilities and the recent zSecure enhancements that help reduce costs, improve availability, simplify security administration and enhance compliance reporting for PCI-DSS, STIG and GSD331.
Discover how Linux on System z provides large and medium-sized enterprises with the opportunity to improve IT economics and qualities of service, and simplify IT management. With tightening budgets, many companies are revaluating their IT environments and seeking ways to cut costs and improve efficiency to free up funding for new services and capabilities. Making sure you are running the most efficient data center possible is a good place to start. Today, more than 70% of IT budgets are tied to daily operations and maintenance, leaving little funding available for the development of new products and services. A zEnterprise for Linux based infrastructure offers unrivaled consolidation and virtualization capabilities that can help reduce overall data center costs up to 70% while improving your system availability, security and service management capabilities.
Is your company using a private cloud? Are there cloud workloads that require high security and availability, or large amounts of data? All cloud workloads are not alike. Some require capabilities only a System z can provide with its enterprise-wide visibility, and control and automation that are key to the cost savings and improved resource utilization promised by cloud. In this session, we will discuss how System z cloud support fits within an enterprise-wide hybrid or private cloud. We will focus on the Tivoli and zEnterprise components needed to successfully move workloads to cloud.
In this session, we will describe how an incorrect assessment of hardware and software costs, migration costs, replacement application development costs, dual operations costs, and more, can all lead to situations where a rehosting effort can go awry. Additionally, not accounting for all the reasons why “deconsolidation” of servers occurs can result in significant cost increases. Thus, it’s crucial to understand the reality and true costs of rehosting workloads off the mainframe.
Relying on the security of the mainframe infrastructure is no longer adequate to meet contemporary challenges. Mainframe data is now accessible via web services, web browsers and mobile devices from anywhere in world. It’s time to consider a more holistic approach to this complex issue. According to the 2011 Verizon Data Breach Investigations Report, more than 85% of breaches go undetected. And because 70% of all production data originates from the mainframe, many mainframe customers are taking a new look at security. In this session, we will explore IBM’s Security Intelligence solution. This massively scalable, real-time enterprise security solution can use advanced analytics to reduce hundreds of millions of security events received daily to a handful of meaningful events that require action.
Organizations are using increasing varieties and large volumes of information to gain deeper insight into their businesses. Protecting this data is essential to controlling business risk, particularly when undertaking big data initiatives. In this session, we will discuss how real-time monitoring and reporting of security-related events helps protect a wide range of data sources across many platforms and database vendors. Other security tips include using prebuilt policies, reports and automation to help lower the cost of compliance, and how to discover sensitive data and categorize vulnerabilities. Join us and take a proactive approach to protecting your data sources.
Enterprise applications are major targets for cyber-criminals because of the valuable data they access. According to the latest IBM X-Force Intelligence Quarterly report, 33% of all security breach disclosures in 2013 targeted web applications. Hackers exploit such vulnerabilities to steal data, disrupt operations and infect users with malware. Given its importance, it is critical for mainframe organizations to understand which external-facing applications are accessing their System z environments and implement effective controls. This can include web and mobile applications on System z or other platforms. It can also include legacy z/OS applications that have new web front-ends. In this session, we’ll share best practices for approaching application security and present the capabilities of IBM Security AppScan 9.0 that will prove valuable to your IT security team when rolling out and managing your application security initiative.
Twitter updates from IBM System z Events
Twitter updates from IBM System z Events