SlideShare a Scribd company logo
Experiences in Mainframe-to-
Splunk® Big Data Access:
Learn What Your Peers are Doing
October 2016
Housekeeping
Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please
reach out to us using the chat window.
Questions Welcome:
– Submit your questions at any time during the presentation using the
chat window.
– We will answer them during our Q&A session following the
presentations.
Recording and Slides:
– This webcast is being recorded. You will receive an email following the
webcast with a link to download both the recording and the slides.
2
Session Abstract and Speakers
The requirement to add mainframe data to the stream of machine-to-machine or “log” data for
operational and security/compliance purposes is real. This webinar details 4 organizations who faced
these requirements and tells their individual stories as to what requirement/mandate they faced, what
options they considered, and how they ultimately addressed it. There will be a live Q&A for participants
to ask follow-up questions as to their stories and how they’re doing today.
3
etary - do not copy or distribute
David Friedman,
Senior Systems Engineer
Steven Menges, Director,
Product Management
Justin Eastman,
Senior Engineer
Big Data is No Longer a “Future”
Syncsort Confidential and Proprietary - do not copy or distribute 4
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
Mainframes Still Host the Most Critical Applications at Big Orgs
5
Syncsort Confidential and Proprietary - do not copy or distribute
71%
Fortune 500
2.5 BillionBus. Transactions / day / per MF
23of Top 25
US Retailers
of World’s
Top Insurers10Top World
Banks92
Source: IBM Organizations Overall2000+
Organization #1: Justin Eastman
6
Syncsort Confidential and Proprietary - do not copy or distribute
Justin Eastman,
Senior Engineer
Reminder:
Type in your questions at any time
during the presentation using the chat
window.
We will answer them during our Q&A
session following the presentations or
afterward.
USE CASE: THE NEED/PROBLEM
Incidents occurring in the organization would result
in the need to turn on additional CPUs to recover
from system being overloaded.
There was a need to get visibility into the health of
multiple sub-systems across different systems in
order to monitor to the load to proactively react to
these situations.
No single tool or monitor gave visibility into all the
different subsystems and across the entire
organization.
7
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Continue with the human flare gun approach currently
used in which multiple groups get involved elongating
the mean time to resolution.
Use existing monitors that require multiple sessions
and SMEs to access and perform triage.
Expand capacity to ensure that systems are not
overloaded.
Continue to rely on the customer to indicate when the
services provided become less responsive.
Look for a new solution to address their issues.
8
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
BIBD Solution to access z/OS log data in Splunk® for real-time
monitoring of critical subsystem performance
Creating single view into the health of all the systems and their
corresponding subsystems
Creating drill down dashboards that provide the KPIs to identify
where the source of the issue resides to that the immediate
source
Resulted in a significant reduction of MTTR and a
improve ability to detect problems before the
customer does.
9
Syncsort Confidential and Proprietary - do not copy or distribute
Big Data Poll
Syncsort Confidential and Proprietary - do not copy or distribute 10
Q1.Which Big Data analytics platforms does your company use today?
o Hadoop
o Splunk
o Other Data Warehouse
o Don’t Know
(Check all that apply)
Organization #2: David Friedman
11
Syncsort Confidential and Proprietary - do not copy or distribute
David Friedman,
Senior Systems Engineer
USE CASE: THE NEED/PROBLEM
12
Syncsort Confidential and Proprietary - do not copy or distribute
Customer had an audit and compliance mandate with
approaching deadline.
Using another product to manually retrieve information on a
daily basis.
Unable to monitor user log-on attempts, password changes,
and access violations on their mainframe environment.
Unable to obtain information in real-time.
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Home-grown solution option explored; determined
would not meet implementation deadline (and may
not have satisfied requirement).
POC bake-off (Syncsort Ironstream performed very well
in a POC against competitive product).
Validated the ability to replace the manual processes
they were using with Ironstream.
13
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
Monitoring security activity on their mainframe
applications to meet audit and compliance requirements
outlined in regulation, including:
– log-on attempts
– password changes
– user access violations
– other security events
Get the information in real-time (and eliminated manual
processes previously accomplished using zSecure)
Filtering enables selection of only the SMF records
needed to produce desired results
14
Syncsort Confidential and Proprietary - do not copy or distribute
Security
Compliance
Organization #3: Justin Eastman
15
Syncsort Confidential and Proprietary - do not copy or distribute
Justin Eastman,
Senior Engineer
USE CASE: THE NEED/PROBLEM
Security threats on the mainframe due to lack of
visibility.
Highly sensitive PHI (Protected Health Information)
escaping as data was moved from the production to
test environment despite having fences and an
automated scrubbing process.
Security information and event management (SIEM)
solution required.
16
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Do nothing and wait for an audit, or even worse, a
security exposure.
Attempt to perform post-exposure forensics.
Manually extract and process logs, SMF records, etc.
and produce audit reports to demonstrate compliance.
Do solution vendor search and utilize Gartner Magic
Quadrant, etc. for enterprise-class SIEM.
17
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
SIEM Solution (Gartner SIEM Leader Splunk®)
BIBD Solution to access z/OS log data in
Splunk® for real-time alerts (Splunk’s chosen mainframe partner
Ironstream)
Combined solution for mainframe logs
provides fast access to:
 Unusual data movements, amount of
movements, and protocols being used
 How much of the data movement is compliant,
non-compliant, or unknown
 Sources of inbound traffic relating to any
anomalies
18
Syncsort Confidential and Proprietary - do not copy or distribute
Organizational confidence in ability to audit data access compliance!
Big Iron to Big Data Poll
Syncsort Confidential and Proprietary - do not copy or distribute 19
Q2. Is Mainframe “log” data going into your big data platform/repository?
o Yes, it is being streamed into it today
o Yes, it goes into it via periodic batch/other input method
o No, but that data has been requested/is desired
o No
o Don’t Know
Organization #4: David Friedman
20
Syncsort Confidential and Proprietary - do not copy or distribute
David Friedman,
Senior Systems Engineer
Reminder:
Type in your questions at any time
during the presentation using the chat
window.
We will answer them during our Q&A
session following the presentations or
afterward.
USE CASE: THE NEED/PROBLEM
21
Syncsort Confidential and Proprietary - do not copy or distribute
Disbursed transaction information systems.
Current tools provide partial solutions.
Require comprehensive analytics across operation.
Enterprise IT Operational Analytics (ITOA) dashboard
desired.
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Organization selected Splunk® Enterprise as their ITOA
solution for distributed computing environment.
Considered Syncsort to access mainframe logs and get
comparable data from mainframe systems.
Conducted thorough POC of Ironstream in conjunction
with Splunk®
After POC, they were able to quickly start deploying it
as a comprehensive monitoring solution.
22
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
Complete picture of overall system health.
Meaningful correlation of information from
disparate sources for faster triage and shorter
MTTR.
Company now able to monitor entire IT
infrastructure to detect potential issues before
they become critical.
23
Syncsort Confidential and Proprietary - do not copy or distribute
Reduce MTTR
Big Iron, Big Data and Big Iron to Big Data: Additional Use Cases?
24
Syncsort Confidential and Proprietary - do not copy or distribute
24
Syncsort Confidential and Proprietary - do not copy or distribute
Security & Compliance (SIEM)
• Access Control
• Data Movement
• Real-time Intrusion Detection
• Others?
IT Operations (ITOA)
• Systems Performance and
Tuning
• Capacity Planning
• Others?
IT Service Intelligence?
Other Monitoring & Analytics?
Big Iron
MVPs: Always Important, Big Iron and Big Data Functions, Staff Now Critical
25Syncsort Confidential and Proprietary - do not copy or distribute
“BMC Annual Mainframe Research Results 2015”1
Big Iron to Big Data Big Data
Syncsort Solutions for New and “Old” Requirements
26Syncsort Confidential and Proprietary - do not copy or distribute
High-performance sort for z/OS®
Best Sort for z Systems
Offload Copy & SMS Compression
and Sort work to zIIP processors
Savings with zIIP
Database Optimization Suites for
IBM DB2® and CA IDMS™
Network Management
z/OS® network management &
security components
Big Data integration with market-
leading support for integration and
access of mainframe and legacy data
sources
Data Access for Big Data
Collect, transform and stream
mainframe app and system log data
in near real time to Splunk Enterprise
Log Data Access for Big Data
High-performance Big Data integration
software – Linux/Unix/Windows;
Hadoop & Spark; on premise and
in the cloud
Big Data Integration
The most advanced sort features for
Unix, Linux, and Windows platforms
Best Sort for Distributed Platforms
Faster application modernization
with less hardware
AppMod
Big Iron Big Iron to Big Data Big Data
Data Funnel
Populate enterprise data lake
at the push of a button
Transparently migrate IMS to DB2
IMS and VSAM  DB2 Migration
Powerful new tools for your databases
Questions and More Information
Additional Questions for David and Justin?
For More Information:
syncsort.com/ironstream
blog.syncsort.com/
Try Ironstream for Free:
syncsort.com/ironstreamstarteredition
Comments/Other:
Steven Menges: smenges@syncsort.com
27
Syncsort Confidential and Proprietary - do not copy or distribute

More Related Content

PPTX
Splunk for vmware virtualization customer presentation
PPTX
SplunkLive! - Splunk for Security
PPTX
SplunkLive! Splunk App for VMware
PPTX
Splunk for Security Breakout Session
PDF
Old Dogs, New Tricks: Big Data from and for Mainframe IT
PPTX
The Modern Data Center Topology
PDF
Network Operation Center Best Practices
Splunk for vmware virtualization customer presentation
SplunkLive! - Splunk for Security
SplunkLive! Splunk App for VMware
Splunk for Security Breakout Session
Old Dogs, New Tricks: Big Data from and for Mainframe IT
The Modern Data Center Topology
Network Operation Center Best Practices

What's hot (20)

PDF
API Training 10 Nov 2014
PPTX
NextGen Endpoint Security for Dummies
PDF
Vulnerability Management
PPTX
The Seismic Impact of the SolarWinds Hack
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PPTX
Operational Intelligence Using Hadoop
PDF
Best practices for building network operations center
PPTX
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
PDF
AccelOps & SOC-NOC Convergence
PPTX
SplunkLive! Splunk for Security
PDF
Enterprise Vulnerability Management: Back to Basics
PDF
Network Operations Center Processes- Isaac Mwesigwa
DOCX
Hayat Resume-1
PPTX
The Greenway Bank Presentation
PPTX
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
PPTX
ITT - Tech CNS Captstone Project
PDF
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
PPTX
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
PDF
How to Migrate Without Downtime
PDF
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
API Training 10 Nov 2014
NextGen Endpoint Security for Dummies
Vulnerability Management
The Seismic Impact of the SolarWinds Hack
Securing your IT infrastructure with SOC-NOC collaboration TWP
Operational Intelligence Using Hadoop
Best practices for building network operations center
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
AccelOps & SOC-NOC Convergence
SplunkLive! Splunk for Security
Enterprise Vulnerability Management: Back to Basics
Network Operations Center Processes- Isaac Mwesigwa
Hayat Resume-1
The Greenway Bank Presentation
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
ITT - Tech CNS Captstone Project
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
How to Migrate Without Downtime
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Ad

Viewers also liked (9)

PPTX
Mainframe Customer Education Webcast: Syncsort Gets Zen
PPTX
Introducing MFX for z/OS 2.1 & ZPSaver Suite
PDF
DevOps for the IBM Mainframe environment
PDF
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
PPTX
Splunk live beginner training nyc
PPTX
Scale Splunk
PDF
Machine Learning + Analytics in Splunk
PPTX
Splunk sales presentation
PDF
Workshop Logfile Analyse mit Splunk
Mainframe Customer Education Webcast: Syncsort Gets Zen
Introducing MFX for z/OS 2.1 & ZPSaver Suite
DevOps for the IBM Mainframe environment
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Splunk live beginner training nyc
Scale Splunk
Machine Learning + Analytics in Splunk
Splunk sales presentation
Workshop Logfile Analyse mit Splunk
Ad

Similar to Experiences in Mainframe-to-Splunk Big Data Access (20)

PDF
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
PDF
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
PDF
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
PPTX
Getting Started with Splunk Enterprise Hands-On Breakout Session
PDF
Modeling and Forecasting – Effective Baselines for Capacity Management
PPTX
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
PDF
Hadoop is Happening
PPTX
Getting Started with Splunk Enterprise
PDF
IBM Power Migration without the Risk and Downtime
PPTX
Getting Started with Splunk Breakout Session
PDF
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
PPTX
9 Hyperion Performance Myths and How to Debunk Them
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
Splunk for big_data
PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PDF
Empowering you with Democratized Data Access, Data Science and Machine Learning
PPTX
SplunkLive! What's New in Splunk 6 Session
PDF
Government Agencies Using Splunk: Is Your Critical Data Missing?
PPTX
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Getting Started with Splunk Enterprise Hands-On Breakout Session
Modeling and Forecasting – Effective Baselines for Capacity Management
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
Hadoop is Happening
Getting Started with Splunk Enterprise
IBM Power Migration without the Risk and Downtime
Getting Started with Splunk Breakout Session
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
9 Hyperion Performance Myths and How to Debunk Them
PPT-Splunk-LegacySIEM-101_FINAL
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for big_data
SplunkLive! Paris 2018: Legacy SIEM to Splunk
Empowering you with Democratized Data Access, Data Science and Machine Learning
SplunkLive! What's New in Splunk 6 Session
Government Agencies Using Splunk: Is Your Critical Data Missing?
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf

Experiences in Mainframe-to-Splunk Big Data Access

  • 1. Experiences in Mainframe-to- Splunk® Big Data Access: Learn What Your Peers are Doing October 2016
  • 2. Housekeeping Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. 2
  • 3. Session Abstract and Speakers The requirement to add mainframe data to the stream of machine-to-machine or “log” data for operational and security/compliance purposes is real. This webinar details 4 organizations who faced these requirements and tells their individual stories as to what requirement/mandate they faced, what options they considered, and how they ultimately addressed it. There will be a live Q&A for participants to ask follow-up questions as to their stories and how they’re doing today. 3 etary - do not copy or distribute David Friedman, Senior Systems Engineer Steven Menges, Director, Product Management Justin Eastman, Senior Engineer
  • 4. Big Data is No Longer a “Future” Syncsort Confidential and Proprietary - do not copy or distribute 4 DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values
  • 5. Mainframes Still Host the Most Critical Applications at Big Orgs 5 Syncsort Confidential and Proprietary - do not copy or distribute 71% Fortune 500 2.5 BillionBus. Transactions / day / per MF 23of Top 25 US Retailers of World’s Top Insurers10Top World Banks92 Source: IBM Organizations Overall2000+
  • 6. Organization #1: Justin Eastman 6 Syncsort Confidential and Proprietary - do not copy or distribute Justin Eastman, Senior Engineer Reminder: Type in your questions at any time during the presentation using the chat window. We will answer them during our Q&A session following the presentations or afterward.
  • 7. USE CASE: THE NEED/PROBLEM Incidents occurring in the organization would result in the need to turn on additional CPUs to recover from system being overloaded. There was a need to get visibility into the health of multiple sub-systems across different systems in order to monitor to the load to proactively react to these situations. No single tool or monitor gave visibility into all the different subsystems and across the entire organization. 7 Syncsort Confidential and Proprietary - do not copy or distribute
  • 8. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Continue with the human flare gun approach currently used in which multiple groups get involved elongating the mean time to resolution. Use existing monitors that require multiple sessions and SMEs to access and perform triage. Expand capacity to ensure that systems are not overloaded. Continue to rely on the customer to indicate when the services provided become less responsive. Look for a new solution to address their issues. 8 Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. USE CASE: SOLUTION AND RESULTS BIBD Solution to access z/OS log data in Splunk® for real-time monitoring of critical subsystem performance Creating single view into the health of all the systems and their corresponding subsystems Creating drill down dashboards that provide the KPIs to identify where the source of the issue resides to that the immediate source Resulted in a significant reduction of MTTR and a improve ability to detect problems before the customer does. 9 Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Big Data Poll Syncsort Confidential and Proprietary - do not copy or distribute 10 Q1.Which Big Data analytics platforms does your company use today? o Hadoop o Splunk o Other Data Warehouse o Don’t Know (Check all that apply)
  • 11. Organization #2: David Friedman 11 Syncsort Confidential and Proprietary - do not copy or distribute David Friedman, Senior Systems Engineer
  • 12. USE CASE: THE NEED/PROBLEM 12 Syncsort Confidential and Proprietary - do not copy or distribute Customer had an audit and compliance mandate with approaching deadline. Using another product to manually retrieve information on a daily basis. Unable to monitor user log-on attempts, password changes, and access violations on their mainframe environment. Unable to obtain information in real-time.
  • 13. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Home-grown solution option explored; determined would not meet implementation deadline (and may not have satisfied requirement). POC bake-off (Syncsort Ironstream performed very well in a POC against competitive product). Validated the ability to replace the manual processes they were using with Ironstream. 13 Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. USE CASE: SOLUTION AND RESULTS Monitoring security activity on their mainframe applications to meet audit and compliance requirements outlined in regulation, including: – log-on attempts – password changes – user access violations – other security events Get the information in real-time (and eliminated manual processes previously accomplished using zSecure) Filtering enables selection of only the SMF records needed to produce desired results 14 Syncsort Confidential and Proprietary - do not copy or distribute Security Compliance
  • 15. Organization #3: Justin Eastman 15 Syncsort Confidential and Proprietary - do not copy or distribute Justin Eastman, Senior Engineer
  • 16. USE CASE: THE NEED/PROBLEM Security threats on the mainframe due to lack of visibility. Highly sensitive PHI (Protected Health Information) escaping as data was moved from the production to test environment despite having fences and an automated scrubbing process. Security information and event management (SIEM) solution required. 16 Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Do nothing and wait for an audit, or even worse, a security exposure. Attempt to perform post-exposure forensics. Manually extract and process logs, SMF records, etc. and produce audit reports to demonstrate compliance. Do solution vendor search and utilize Gartner Magic Quadrant, etc. for enterprise-class SIEM. 17 Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. USE CASE: SOLUTION AND RESULTS SIEM Solution (Gartner SIEM Leader Splunk®) BIBD Solution to access z/OS log data in Splunk® for real-time alerts (Splunk’s chosen mainframe partner Ironstream) Combined solution for mainframe logs provides fast access to:  Unusual data movements, amount of movements, and protocols being used  How much of the data movement is compliant, non-compliant, or unknown  Sources of inbound traffic relating to any anomalies 18 Syncsort Confidential and Proprietary - do not copy or distribute Organizational confidence in ability to audit data access compliance!
  • 19. Big Iron to Big Data Poll Syncsort Confidential and Proprietary - do not copy or distribute 19 Q2. Is Mainframe “log” data going into your big data platform/repository? o Yes, it is being streamed into it today o Yes, it goes into it via periodic batch/other input method o No, but that data has been requested/is desired o No o Don’t Know
  • 20. Organization #4: David Friedman 20 Syncsort Confidential and Proprietary - do not copy or distribute David Friedman, Senior Systems Engineer Reminder: Type in your questions at any time during the presentation using the chat window. We will answer them during our Q&A session following the presentations or afterward.
  • 21. USE CASE: THE NEED/PROBLEM 21 Syncsort Confidential and Proprietary - do not copy or distribute Disbursed transaction information systems. Current tools provide partial solutions. Require comprehensive analytics across operation. Enterprise IT Operational Analytics (ITOA) dashboard desired.
  • 22. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Organization selected Splunk® Enterprise as their ITOA solution for distributed computing environment. Considered Syncsort to access mainframe logs and get comparable data from mainframe systems. Conducted thorough POC of Ironstream in conjunction with Splunk® After POC, they were able to quickly start deploying it as a comprehensive monitoring solution. 22 Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. USE CASE: SOLUTION AND RESULTS Complete picture of overall system health. Meaningful correlation of information from disparate sources for faster triage and shorter MTTR. Company now able to monitor entire IT infrastructure to detect potential issues before they become critical. 23 Syncsort Confidential and Proprietary - do not copy or distribute Reduce MTTR
  • 24. Big Iron, Big Data and Big Iron to Big Data: Additional Use Cases? 24 Syncsort Confidential and Proprietary - do not copy or distribute 24 Syncsort Confidential and Proprietary - do not copy or distribute Security & Compliance (SIEM) • Access Control • Data Movement • Real-time Intrusion Detection • Others? IT Operations (ITOA) • Systems Performance and Tuning • Capacity Planning • Others? IT Service Intelligence? Other Monitoring & Analytics?
  • 25. Big Iron MVPs: Always Important, Big Iron and Big Data Functions, Staff Now Critical 25Syncsort Confidential and Proprietary - do not copy or distribute “BMC Annual Mainframe Research Results 2015”1 Big Iron to Big Data Big Data
  • 26. Syncsort Solutions for New and “Old” Requirements 26Syncsort Confidential and Proprietary - do not copy or distribute High-performance sort for z/OS® Best Sort for z Systems Offload Copy & SMS Compression and Sort work to zIIP processors Savings with zIIP Database Optimization Suites for IBM DB2® and CA IDMS™ Network Management z/OS® network management & security components Big Data integration with market- leading support for integration and access of mainframe and legacy data sources Data Access for Big Data Collect, transform and stream mainframe app and system log data in near real time to Splunk Enterprise Log Data Access for Big Data High-performance Big Data integration software – Linux/Unix/Windows; Hadoop & Spark; on premise and in the cloud Big Data Integration The most advanced sort features for Unix, Linux, and Windows platforms Best Sort for Distributed Platforms Faster application modernization with less hardware AppMod Big Iron Big Iron to Big Data Big Data Data Funnel Populate enterprise data lake at the push of a button Transparently migrate IMS to DB2 IMS and VSAM  DB2 Migration Powerful new tools for your databases
  • 27. Questions and More Information Additional Questions for David and Justin? For More Information: syncsort.com/ironstream blog.syncsort.com/ Try Ironstream for Free: syncsort.com/ironstreamstarteredition Comments/Other: Steven Menges: smenges@syncsort.com 27 Syncsort Confidential and Proprietary - do not copy or distribute