SlideShare a Scribd company logo
Enterprise Security in Mainframe-
Connected Environments
Rich Fronheiser
Housekeeping
Webcast Audio
• Today’s webcast audio is streamed through your computer speakers.
• If you need technical assistance with the web interface or audio,
please reach out to us using the chat window.
Questions Welcome
• Submit your questions at any time during the presentation
using the chat window.
• We will follow up after the session.
Recording and slides
• This webcast is being recorded. You will receive an
email following the webcast with a link to download
both the recording and the slides.
• Security Information and Event Management
• Real-time analysis of security alerts
• Vulnerability management
• Policy compliance
• External threat data
What is SIEM?
Log Analysis What is a Log?
• Logs are emitted by network
devices, operating systems,
applications and all manner of
intelligent or programmable device.
• A stream of messages in time-
sequence often comprise a log.
• Logs may be directed to files and
stored on disk, or directed as a
network stream to a log collector.
Organizations analyze
these logs to proactively
and reactively mitigate
different risks.
Typical reasons to perform
log analysis are:
• Performance and capacity issues
• Compliance with security policies
• Compliance with audit or regulation
• System Troubleshooting
Mainframe Challenges
• Mainframe a key component
of key IT services
• Huge amount of operations
data stored in logs on
mainframes
• No visibility, except by expert
mainframe teams
• Incomplete picture for
security teams
Big Iron to Big
Data Analytics
Challenges
So many data sources
Mainframe:
Systems Management Facility (SMF),
Syslog, Log4j web and application logs,
RMF, RACF, USS files and standard
datasets
IBM i:
QAUD Journal, QHIST, Message Queues,
Operational Logs
Format of data
Mainframe:
• Complex data structures (SMF) with
headers, product sections, data
sections, variable length and self-
describing
• EBCDIC not recognized outside of
the mainframe world
• Binary flags and fields
IBM i:
• Complex data structures with
unique journal entry types, headers,
product sections, data sections,
variable length and self-describing
• IBM i journals in DB2
• Collection Services
• IBM i information needs to be
converted to workable formats such
as Syslog, CEF, JSON, etc.
Volume of data
Millions of records generated daily
Difficulty to get the
information in a timely
manner
• Not real-time, typically have to wait
overnight for an offload
• Typical daily FTP upload/downloads
can’t get granular
• High performance, low-cost, platform for collecting critical
system information in real-time
• Normalization of the z/OS and data so it can be used off
platform analytics engines
• Full analytics, visualization, and customization with no limitations
on what can be viewed
• Ability to easily combine information from different data sources
and systems
• Address the SME challenge: use by network managers, security
analysts, application analysts, enterprise architects without
requiring mainframe access or expertise
What does Ironstream® provide?
Ironstream® Architectural Overview
Assembler
COBOL C,
REXX
!
IRONSTREAM DATA FORWARDER
TCP/IP
Ironstream Desktop
DCE IDT
Data Collection Extension
SYSOUT
Live/Stored
SPOOL Data
Db2 USS Alerts
Networks
Components
ForwarderAPI
Application Data
SYSLOG
SYSLOGGD
SMF RMF File Load Log4j
Use Cases - Problems Ironstream® solves
IT Operations Analytics/ITOA
• Bigger picture of what's happening in the environment
• Make better decisions to take control of the IT infrastructure
• Problem Detection & Isolation
• Ensure SLAs Met
Security and Compliance/SIEM
• Detect and prevent security threats
• Ensure compliance
• Ensure audits pass
• Data from multiple sources
• TSO logon tracking – SMF Type 30
• TSO account activity (create, update, delete, lockout) – SMF Type 80
• Port scans, DoS attacks, malformed data packets – TRMD and SyslogD
• FTP authentications and file analysis (file create, access, update, delete) – SMF Type 119 Records and IP
traffic analysis information
• Network events – Ironstream® Network Monitoring Component
Mainframe Security – Data Challenges
• Total visibility into:
• Authentication and access failures
• Creation or deletion of users
• Changes to user security information, passwords, and access rights
• All log-in activity
• Excessive data tramsmissions
• Unusual movement of data
• Intrusion detection
Ironstream® maps the data to the Splunk ES Common Information Model (CIM), enabling splunk ES
to provide a true enterprise-wide view of security activity, threats, and intrusions.
It’s a comprehensive view of their security environment from a single pane of glass!
Ironstream® and Splunk® Enterprise Security provide…
SIEM: z/OS Security
SIEM: Splunk® Enterprise Security
Enterprise Security in Mainframe-Connected Environments

More Related Content

PPTX
Essential Layers of IBM i Security: File and Field Security
PDF
Security 101: Controlling Access to IBM i Systems and Data
PPTX
Essential Layers of IBM i Security: System-Access Security
PDF
Security 101: Controlling Access to IBM i Systems and Data
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
PPT
Managing Clients' Mission Critical Applications
PDF
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
Essential Layers of IBM i Security: File and Field Security
Security 101: Controlling Access to IBM i Systems and Data
Essential Layers of IBM i Security: System-Access Security
Security 101: Controlling Access to IBM i Systems and Data
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Managing Clients' Mission Critical Applications
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat

What's hot (20)

PDF
CNIT 123: Ch 13: Network Protection Systems
PPTX
Operations Security
PPT
Security Framework for the IPv6 Era
PPTX
Honeywell Cybersecurity
PDF
Resume | Vijay Navgire
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PPTX
Nick Lancaster
PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PPTX
Is Department Roles
PDF
SCC (Security Control Center)
PPTX
Exfiltration slides-v1-release
PPTX
Network Field Day 11 - Skyport Systems Presentation
PDF
Ch 8: Desktop and Server OS Vulnerabilites
PPTX
fire walls
PDF
CNIT 123: Ch 7: Programming for Security Professionals
PPTX
10 Quick Cybersecurity Wins for Small Business
PPTX
Section c group2_firewall_ final
PPTX
Cybersecurity: More than A DoD Issue
PPT
Networking
PPTX
Firewall
CNIT 123: Ch 13: Network Protection Systems
Operations Security
Security Framework for the IPv6 Era
Honeywell Cybersecurity
Resume | Vijay Navgire
Ch 9: Embedded Operating Systems: The Hidden Threat
Nick Lancaster
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Is Department Roles
SCC (Security Control Center)
Exfiltration slides-v1-release
Network Field Day 11 - Skyport Systems Presentation
Ch 8: Desktop and Server OS Vulnerabilites
fire walls
CNIT 123: Ch 7: Programming for Security Professionals
10 Quick Cybersecurity Wins for Small Business
Section c group2_firewall_ final
Cybersecurity: More than A DoD Issue
Networking
Firewall
Ad

Similar to Enterprise Security in Mainframe-Connected Environments (20)

PDF
360-Degree View of IT Infrastructure with IT Operations Analytics
PDF
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
PDF
Government Agencies Using Splunk: Is Your Critical Data Missing?
PPTX
Don't Leave Your Traditional IBM Systems Out of Your IT Operations Efforts
PPTX
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
PPTX
Utilizing Mainframe Machine Data in Security Operations
PDF
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
PDF
PPTX
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
PDF
Old Dogs, New Tricks: Big Data from and for Mainframe IT
PPTX
IBM i Security SIEM Integration
PDF
Threat intelligence solution
PDF
From the Splunk Front Lines: Unlocking Insights from IBM i Data
PDF
What’s New in Syncsort Ironstream 2.1
PPTX
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
PDF
Big security for big data
PPTX
SplunkLive! - Splunk for Security
PDF
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
PPTX
Splunk for Security Breakout Session
PDF
How to Get IBM i Security and Operational Insights with Splunk
360-Degree View of IT Infrastructure with IT Operations Analytics
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Government Agencies Using Splunk: Is Your Critical Data Missing?
Don't Leave Your Traditional IBM Systems Out of Your IT Operations Efforts
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Utilizing Mainframe Machine Data in Security Operations
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Old Dogs, New Tricks: Big Data from and for Mainframe IT
IBM i Security SIEM Integration
Threat intelligence solution
From the Splunk Front Lines: Unlocking Insights from IBM i Data
What’s New in Syncsort Ironstream 2.1
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
Big security for big data
SplunkLive! - Splunk for Security
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Splunk for Security Breakout Session
How to Get IBM i Security and Operational Insights with Splunk
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
cuic standard and advanced reporting.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
cuic standard and advanced reporting.pdf
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction

Enterprise Security in Mainframe-Connected Environments

  • 1. Enterprise Security in Mainframe- Connected Environments Rich Fronheiser
  • 2. Housekeeping Webcast Audio • Today’s webcast audio is streamed through your computer speakers. • If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome • Submit your questions at any time during the presentation using the chat window. • We will follow up after the session. Recording and slides • This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides.
  • 3. • Security Information and Event Management • Real-time analysis of security alerts • Vulnerability management • Policy compliance • External threat data What is SIEM?
  • 4. Log Analysis What is a Log? • Logs are emitted by network devices, operating systems, applications and all manner of intelligent or programmable device. • A stream of messages in time- sequence often comprise a log. • Logs may be directed to files and stored on disk, or directed as a network stream to a log collector. Organizations analyze these logs to proactively and reactively mitigate different risks. Typical reasons to perform log analysis are: • Performance and capacity issues • Compliance with security policies • Compliance with audit or regulation • System Troubleshooting
  • 5. Mainframe Challenges • Mainframe a key component of key IT services • Huge amount of operations data stored in logs on mainframes • No visibility, except by expert mainframe teams • Incomplete picture for security teams
  • 6. Big Iron to Big Data Analytics Challenges So many data sources Mainframe: Systems Management Facility (SMF), Syslog, Log4j web and application logs, RMF, RACF, USS files and standard datasets IBM i: QAUD Journal, QHIST, Message Queues, Operational Logs Format of data Mainframe: • Complex data structures (SMF) with headers, product sections, data sections, variable length and self- describing • EBCDIC not recognized outside of the mainframe world • Binary flags and fields IBM i: • Complex data structures with unique journal entry types, headers, product sections, data sections, variable length and self-describing • IBM i journals in DB2 • Collection Services • IBM i information needs to be converted to workable formats such as Syslog, CEF, JSON, etc. Volume of data Millions of records generated daily Difficulty to get the information in a timely manner • Not real-time, typically have to wait overnight for an offload • Typical daily FTP upload/downloads can’t get granular
  • 7. • High performance, low-cost, platform for collecting critical system information in real-time • Normalization of the z/OS and data so it can be used off platform analytics engines • Full analytics, visualization, and customization with no limitations on what can be viewed • Ability to easily combine information from different data sources and systems • Address the SME challenge: use by network managers, security analysts, application analysts, enterprise architects without requiring mainframe access or expertise What does Ironstream® provide?
  • 8. Ironstream® Architectural Overview Assembler COBOL C, REXX ! IRONSTREAM DATA FORWARDER TCP/IP Ironstream Desktop DCE IDT Data Collection Extension SYSOUT Live/Stored SPOOL Data Db2 USS Alerts Networks Components ForwarderAPI Application Data SYSLOG SYSLOGGD SMF RMF File Load Log4j
  • 9. Use Cases - Problems Ironstream® solves IT Operations Analytics/ITOA • Bigger picture of what's happening in the environment • Make better decisions to take control of the IT infrastructure • Problem Detection & Isolation • Ensure SLAs Met Security and Compliance/SIEM • Detect and prevent security threats • Ensure compliance • Ensure audits pass
  • 10. • Data from multiple sources • TSO logon tracking – SMF Type 30 • TSO account activity (create, update, delete, lockout) – SMF Type 80 • Port scans, DoS attacks, malformed data packets – TRMD and SyslogD • FTP authentications and file analysis (file create, access, update, delete) – SMF Type 119 Records and IP traffic analysis information • Network events – Ironstream® Network Monitoring Component Mainframe Security – Data Challenges
  • 11. • Total visibility into: • Authentication and access failures • Creation or deletion of users • Changes to user security information, passwords, and access rights • All log-in activity • Excessive data tramsmissions • Unusual movement of data • Intrusion detection Ironstream® maps the data to the Splunk ES Common Information Model (CIM), enabling splunk ES to provide a true enterprise-wide view of security activity, threats, and intrusions. It’s a comprehensive view of their security environment from a single pane of glass! Ironstream® and Splunk® Enterprise Security provide…