2014 IBM zEnterprise Technology Summit


Build a stronger business with the latest innovations in mainframe technology

A Virtual Event on June 25, 2014 Now Available for Replay. IBM.A Virtual Event on June 25, 2014 Now Available for Replay. IBM.

Tab navigation

Track 5 - Data Center Operations – Cloud and Systems Management Update
Developed for: Operations managers and system programmers

Session 1: Exploit analytics to monitor and manage new technologies like mobile on System z
Session 2: Improve availability and productivity with proactive automation, including OMEGAMON®
Session 3: Demonstrating governance, risk and compliance on your mainframe
Session 4: IT optimization with Linux on System z
Session 5: Value of moving hybrid and private cloud workloads to System z
Session 6: The reality of rehosting
Session 7: Security Intelligence solution for System z and the enterprise
Session 8: Top big data security tips and ultimate protection for enterprise data
Session 9: Solutions and best practices for securing applications that access System z environments

Abstract

Session 1: Exploit analytics to monitor and manage new technologies like mobile on System z

Are you being asked to support new technologies like mobile, big data and cloud? Do you have all the analytic information you need to monitor and support new workloads? Much of the data and workloads required for these technologies currently run on System z. Taking advantage of additional analytics can help support those workloads and more easily integrate System z into these new environments, while minimizing disruption of current enterprise workloads. We’ll discuss how analytics, including System z, helps successfully integrate systems of engagement with backend systems of record. Learn how analytics can improve visibility and assist in understanding the impact of adding new technologies to System z.


Session 2: Improve availability and productivity with proactive automation, including OMEGAMON

How can you ensure that the environment where your mission-critical business applications run has the highest availability possible, while increasing productivity across an increasingly heterogeneous System z environment? Using OMEGAMON XE with Tivoli® System Automation and Workload Automation solutions, you can automate the monitoring and management of your business applications end-to-end from a single point of control. We’ll use examples of common zEnterprise situations where having OMEGAMON and System Automation working together can proactively resolve problems.


Session 3: Demonstrating governance, risk and compliance on your mainframe

The mainframe continues to be the ultimate security platform, with its combination of industry-leading hardware and software technology. System z is unique in providing integrated architecture, hardware, operating system, security software, data protection, network communications, and application security as a superior platform for web, cloud, mobile and data analytics. We will discuss how the IBM Security zSecure™ suite helps administrators deal with the scope and complexity of mainframe security by automating user provisioning and access control management. In this session, you’ll get an overview of mainframe security capabilities and the recent zSecure enhancements that help reduce costs, improve availability, simplify security administration and enhance compliance reporting for PCI-DSS, STIG and GSD331.


Session 4: IT optimization with Linux on System z

Discover how Linux on System z provides large and medium-sized enterprises with the opportunity to improve IT economics and qualities of service, and simplify IT management. With tightening budgets, many companies are revaluating their IT environments and seeking ways to cut costs and improve efficiency to free up funding for new services and capabilities. Making sure you are running the most efficient data center possible is a good place to start. Today, more than 70% of IT budgets are tied to daily operations and maintenance, leaving little funding available for the development of new products and services. A zEnterprise for Linux based infrastructure offers unrivaled consolidation and virtualization capabilities that can help reduce overall data center costs up to 70% while improving your system availability, security and service management capabilities.


Session 5: Value of moving hybrid and private cloud workloads to System z

Is your company using a private cloud? Are there cloud workloads that require high security and availability, or large amounts of data? All cloud workloads are not alike. Some require capabilities only a System z can provide with its enterprise-wide visibility, and control and automation that are key to the cost savings and improved resource utilization promised by cloud. In this session, we will discuss how System z cloud support fits within an enterprise-wide hybrid or private cloud. We will focus on the Tivoli and zEnterprise components needed to successfully move workloads to cloud.


Session 6: The reality of rehosting

In this session, we will describe how an incorrect assessment of hardware and software costs, migration costs, replacement application development costs, dual operations costs, and more, can all lead to situations where a rehosting effort can go awry. Additionally, not accounting for all the reasons why “deconsolidation” of servers occurs can result in significant cost increases. Thus, it’s crucial to understand the reality and true costs of rehosting workloads off the mainframe.


Session 7: Security Intelligence solution for System z and the enterprise

Relying on the security of the mainframe infrastructure is no longer adequate to meet contemporary challenges. Mainframe data is now accessible via web services, web browsers and mobile devices from anywhere in world. It’s time to consider a more holistic approach to this complex issue. According to the 2011 Verizon Data Breach Investigations Report, more than 85% of breaches go undetected. And because 70% of all production data originates from the mainframe, many mainframe customers are taking a new look at security. In this session, we will explore IBM’s Security Intelligence solution. This massively scalable, real-time enterprise security solution can use advanced analytics to reduce hundreds of millions of security events received daily to a handful of meaningful events that require action.


Session 8: Top big data security tips and ultimate protection for enterprise data

Organizations are using increasing varieties and large volumes of information to gain deeper insight into their businesses. Protecting this data is essential to controlling business risk, particularly when undertaking big data initiatives. In this session, we will discuss how real-time monitoring and reporting of security-related events helps protect a wide range of data sources across many platforms and database vendors. Other security tips include using prebuilt policies, reports and automation to help lower the cost of compliance, and how to discover sensitive data and categorize vulnerabilities. Join us and take a proactive approach to protecting your data sources.


Session 9: Solutions and best practices for securing applications that access System z environments

Enterprise applications are major targets for cyber-criminals because of the valuable data they access. According to the latest IBM X-Force Intelligence Quarterly report, 33% of all security breach disclosures in 2013 targeted web applications. Hackers exploit such vulnerabilities to steal data, disrupt operations and infect users with malware. Given its importance, it is critical for mainframe organizations to understand which external-facing applications are accessing their System z environments and implement effective controls. This can include web and mobile applications on System z or other platforms. It can also include legacy z/OS applications that have new web front-ends. In this session, we’ll share best practices for approaching application security and present the capabilities of IBM Security AppScan 9.0 that will prove valuable to your IT security team when rolling out and managing your application security initiative.


6 of 6 pages | Previous |


Registration

Upcoming Events

Twitter updates from IBM System z Events

Twitter updates from IBM System z Events