SlideShare a Scribd company logo
Machine Learning for Your Enterprise:
Operations and Security for Mainframe Enterprises
Housekeeping
Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please
reach out to us using the chat window.
Questions Welcome:
– Submit your questions at any time during the presentation using the
chat window.
– We will answer them during our Q&A session following the
presentations.
Recording and Slides:
– This webcast is being recorded. You will receive an email following the
webcast with a link to download both the recording and the slides.
2
Session Abstract and Speakers
Machine Learning for Your Enterprise: Operations and Security for Mainframe
Enterprises
– What is Machine Learning: The Vision vs. Reality
– The Challenges Driving Automated Mainframe Operations
– Use Cases for Machine Learning at Mainframe Enterprises
The presenters will also do an open Q&A with you and discuss results from our interactive quick-
polls conducted during the session.
3
Syncsort Confidential and Proprietary - do not copy or distribute
Zhe “Maggie” Li
Chief Architect
Steven Menges, Director,
Product Management
David Hodgson,
General Manager/CPO
Speakers
4
Syncsort Confidential and Proprietary - do not copy or distribute
Zhe “Maggie” Li
Chief Architect
Speakers
5
Syncsort Confidential and Proprietary - do not copy or distribute
David Hodgson,
General Manager/CPO
Machine Learning Poll #1
Syncsort Confidential and Proprietary - do not copy or distribute 6
Q1.Which Big Data analytics platforms does your company use today?
o Hadoop
o Splunk
o Elastic / ELK stack
o SAS
o Other Data Warehouse
o Don’t Know
(Check all that apply)
77Syncsort Confidential and Proprietary - do not copy or distribute
Enterprise Computing – Mainframe?
88Syncsort Confidential and Proprietary - do not copy or distribute
2000+ Organizations Overall
71%
Fortune 500
2.5 BillionBus. Transactions / day / per MF
23of Top 25
US Retailers
of World’s
Top Insurers10Top World
Banks92
Source: IBM
Mainframe in Enterprises Today
Enterprises With Mainframes Facing New Challenges
Security
– Mainframes are connected to mobile, IOT, cloud and open systems
– External attacks
– Internal threats (unknown unknown)
Automation of IT Operations
– Transactions grow exponentially
– Increased complexity
– Aging problem for mainframe skilled population
– Lower costs required
Machine Learning for the Enterprise - No Longer a “Future?”
Syncsort Confidential and Proprietary - do not copy or distribute 10
What is Machine Learning?
“Machine Learning is a fascinating field of artificial intelligence research and
practice where we investigate how computer agents can improve their
perception, cognition, and action with experience. Machine Learning is about
machines improving from data, knowledge, experience, and interaction…”
Machine Learning
Machine learning uses algorithms to build analytical
models and help computers “learn” from data.
It makes predictions and uncovers hidden insights about
relationships and trends.
Machine Learning
Categories of Techniques
Supervised Learning
Unsupervised Learning
Categories of Techniques
Supervised Learning: Have the idea that there is a relationship between the
input and the output.
• Regression model: predict continuous valued output
• Housing price
• Weather forecast
• Classification model: map input variables into discrete categories.
• Identify cancer
• Handwriting detection
Unsupervised Learning: little or no idea what our results should look like.
• Clustering:
• Market segmentation
• Social network analysis
• Anomaly detection
Predict with Machine Learning
actual data input
y = H (X) prediction = H (X)
hypothesis new input
The Vision vs. Reality
Machine Data-driven Analytics
Machine Learning Poll #2
Syncsort Confidential and Proprietary - do not copy or distribute 19
Q2. Is Mainframe SMF and/or “log” data going into your big data
platform/repository?
o Yes, it is being streamed into it today
o Yes, it goes into it via periodic batch/other input method
o No, but that data has been requested/is desired
o No
o Don’t Know
Reminder
20
Syncsort Confidential and Proprietary - do not copy or distribute
Type in your questions at any time during the
presentation using the chat window.
We will answer them during our Q&A session following
the presentations or afterward.
Examples
21
Syncsort Confidential and Proprietary - do not copy or distribute
Critical Machine Data  Streamed to a Big Data Platform
Critical Mainframe Machine Data 
Normalized and Streamed to Splunk with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Machine Data  Machine Learning Platform - High Level Architecture
Send TCP
Send HTTP
Send Kafka
Predictive Analytics
With Machine Learning
Splunk/
Hadoop/
Cloud
Get TCP
Get HTTP
Consume Kafka
Automation tools
Other Apps
Operator
commands
Dynamic
reconfiguration
Data collection
Data Transformation
Data lineage/Metering
data
feedback
z/OS
Ironstream
Configuration
GUI
Splunk Platform Machine Learning Toolkit
The Machine Learning Toolkit App delivers new SPL commands,
custom visualizations, assistants, and examples to explore a variety
of ml concepts.
Assistants:
– Predict Numeric Fields (Linear Regression): e.g. predict median house
values.
– Predict Categorical Fields (Logistic Regression): e.g. predict customer
churn.
– Detect Numeric Outliers (distribution statistics): e.g. detect outliers in IT
Ops data.
– Detect Categorical Outliers (probabilistic measures): e.g. detect outliers
in diabetes patient records.
– Forecast Time Series: e.g. forecast data center growth and capacity
planning.
– Cluster Numeric Events: e.g. Cluster Hard Drives by SMART Metrics
The Basic Process of Machine Learning
Clean and transform your data
– To meet the analytics explicit requirements
Fit the model
– Toolkit features 27 algorithms for fitting models
– Over 300 open source Python algorithms in the add-on
Validate the model
– Each assistant provides a few methods in the validate section
Refine the model
– Adjust the parameters to improve the metrics
Deploy the model
– Deployment actions fall into the following categories
• Make prediction or forecast
• Detect outliers and anomalies
• Trigger or inform an action
Splunk Platform Machine Learning Visualizations
2828
Use Case Areas
Syncsort Confidential and Proprietary - do not copy or distribute
• RACF/ACF2/TSS
Authentications
• TSO account & login
activity
• FTP sessions & file
activity
• Sensitive data access
& movement
(PII/PHI)
• Configuration
settings (e.g. FISMA)
• IRS Pub 1075
• Incident triage
• Response
times/SLAs
• Latencies
• Exceptions
• Resource utilization
• Anomalous behavior
detection
• Glass table view of entire
service
• Predictive analytics
Security
Trouble-
Shooting
Health
Monitoring
Compliance
Summary
29
Syncsort Confidential and Proprietary - do not copy or distribute
Questions and More Information
Additional Questions for David and Maggie?
For More Information:
syncsort.com/ironstream
blog.syncsort.com/
Try Ironstream for Free:
syncsort.com/ironstreamstarteredition
Comments/Other:
Steven Menges: smenges@syncsort.com
30
Syncsort Confidential and Proprietary - do not copy or distribute

More Related Content

PPTX
Rise of the machines -- Owasp israel -- June 2014 meetup
PPTX
Integrate with ldap
PDF
Developer 2.0
PPTX
Dynamic access control sbc12 - thuan nguyen
PPTX
Strategies for Transitioning From SharePoint On-Prem to Office 365
PPTX
Marketing automation solutions webinar (part 2)
PPTX
Gentle introduction to Machine Learning
PPTX
2016 the year of machine learning 12.16.2015
Rise of the machines -- Owasp israel -- June 2014 meetup
Integrate with ldap
Developer 2.0
Dynamic access control sbc12 - thuan nguyen
Strategies for Transitioning From SharePoint On-Prem to Office 365
Marketing automation solutions webinar (part 2)
Gentle introduction to Machine Learning
2016 the year of machine learning 12.16.2015

Viewers also liked (18)

PDF
Introducing Ansible
PDF
Placement of BPM runtime components in an SOA environment
PPTX
How to Triple Your Speed of Development Using Automation
PDF
Deloitte BPM case study by WorkflowGen
PPTX
AI & Machine Learning - Webinar Deck
PDF
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
PPTX
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
PDF
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
PPTX
Practical Strategies to Designing Beautiful Portals
PPTX
Practical Strategies for Transitioning to Office 365 #sptechcon
PDF
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
PPT
Case Study for Project Management System Using Sharepoint
PDF
Entrepreneurship with Data, Machine Learning and AI
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PDF
Automation Technology Series: Part 2: Intelligent automation: Driving efficie...
PPTX
SEM Performance with Machine Learning
PDF
Closing with Coffee: Energizing and Engaging Target Accounts
PDF
Microsoft PPM tool (Project Online / Project Server) Case Study by epmsolutio...
Introducing Ansible
Placement of BPM runtime components in an SOA environment
How to Triple Your Speed of Development Using Automation
Deloitte BPM case study by WorkflowGen
AI & Machine Learning - Webinar Deck
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Practical Strategies to Designing Beautiful Portals
Practical Strategies for Transitioning to Office 365 #sptechcon
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
Case Study for Project Management System Using Sharepoint
Entrepreneurship with Data, Machine Learning and AI
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Automation Technology Series: Part 2: Intelligent automation: Driving efficie...
SEM Performance with Machine Learning
Closing with Coffee: Energizing and Engaging Target Accounts
Microsoft PPM tool (Project Online / Project Server) Case Study by epmsolutio...
Ad

Similar to Machine Learning for Your Enterprise: Operations and Security for Mainframe Enterprises (20)

PDF
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
PDF
Modeling and Forecasting – Effective Baselines for Capacity Management
PDF
Experiences in Mainframe-to-Splunk Big Data Access
PDF
Old Dogs, New Tricks: Big Data from and for Mainframe IT
PDF
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
PPTX
Machine Learning AND Deep Learning for OpenPOWER
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
PPTX
AI for Customer Service: How to Improve Contact Center Efficiency with Machin...
PPTX
How to analyze text data for AI and ML with Named Entity Recognition
PDF
IBM Power Migration without the Risk and Downtime
PDF
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
PPTX
Building Service Intelligence with Splunk IT Service Intelligence (ITSI)
PPTX
Machine Learning + Analytics in Splunk
PPTX
Machine Learning and Analytics Breakout Session
PDF
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
PPTX
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
PPTX
SplunkLive! Splunk App for VMware
PPTX
Machine Learning and Analytics Breakout Session
PDF
Digital Transformation and Process Optimization in Manufacturing
PPTX
So you want to do Data Science.... what now?
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Modeling and Forecasting – Effective Baselines for Capacity Management
Experiences in Mainframe-to-Splunk Big Data Access
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Machine Learning AND Deep Learning for OpenPOWER
Corona| COVID IT Tactical Security Preparedness: Threat Management
AI for Customer Service: How to Improve Contact Center Efficiency with Machin...
How to analyze text data for AI and ML with Named Entity Recognition
IBM Power Migration without the Risk and Downtime
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Building Service Intelligence with Splunk IT Service Intelligence (ITSI)
Machine Learning + Analytics in Splunk
Machine Learning and Analytics Breakout Session
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
SplunkLive! Splunk App for VMware
Machine Learning and Analytics Breakout Session
Digital Transformation and Process Optimization in Manufacturing
So you want to do Data Science.... what now?
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Machine Learning for Your Enterprise: Operations and Security for Mainframe Enterprises

  • 1. Machine Learning for Your Enterprise: Operations and Security for Mainframe Enterprises
  • 2. Housekeeping Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. 2
  • 3. Session Abstract and Speakers Machine Learning for Your Enterprise: Operations and Security for Mainframe Enterprises – What is Machine Learning: The Vision vs. Reality – The Challenges Driving Automated Mainframe Operations – Use Cases for Machine Learning at Mainframe Enterprises The presenters will also do an open Q&A with you and discuss results from our interactive quick- polls conducted during the session. 3 Syncsort Confidential and Proprietary - do not copy or distribute Zhe “Maggie” Li Chief Architect Steven Menges, Director, Product Management David Hodgson, General Manager/CPO
  • 4. Speakers 4 Syncsort Confidential and Proprietary - do not copy or distribute Zhe “Maggie” Li Chief Architect
  • 5. Speakers 5 Syncsort Confidential and Proprietary - do not copy or distribute David Hodgson, General Manager/CPO
  • 6. Machine Learning Poll #1 Syncsort Confidential and Proprietary - do not copy or distribute 6 Q1.Which Big Data analytics platforms does your company use today? o Hadoop o Splunk o Elastic / ELK stack o SAS o Other Data Warehouse o Don’t Know (Check all that apply)
  • 7. 77Syncsort Confidential and Proprietary - do not copy or distribute Enterprise Computing – Mainframe?
  • 8. 88Syncsort Confidential and Proprietary - do not copy or distribute 2000+ Organizations Overall 71% Fortune 500 2.5 BillionBus. Transactions / day / per MF 23of Top 25 US Retailers of World’s Top Insurers10Top World Banks92 Source: IBM Mainframe in Enterprises Today
  • 9. Enterprises With Mainframes Facing New Challenges Security – Mainframes are connected to mobile, IOT, cloud and open systems – External attacks – Internal threats (unknown unknown) Automation of IT Operations – Transactions grow exponentially – Increased complexity – Aging problem for mainframe skilled population – Lower costs required
  • 10. Machine Learning for the Enterprise - No Longer a “Future?” Syncsort Confidential and Proprietary - do not copy or distribute 10
  • 11. What is Machine Learning? “Machine Learning is a fascinating field of artificial intelligence research and practice where we investigate how computer agents can improve their perception, cognition, and action with experience. Machine Learning is about machines improving from data, knowledge, experience, and interaction…”
  • 12. Machine Learning Machine learning uses algorithms to build analytical models and help computers “learn” from data. It makes predictions and uncovers hidden insights about relationships and trends.
  • 14. Categories of Techniques Supervised Learning Unsupervised Learning
  • 15. Categories of Techniques Supervised Learning: Have the idea that there is a relationship between the input and the output. • Regression model: predict continuous valued output • Housing price • Weather forecast • Classification model: map input variables into discrete categories. • Identify cancer • Handwriting detection Unsupervised Learning: little or no idea what our results should look like. • Clustering: • Market segmentation • Social network analysis • Anomaly detection
  • 16. Predict with Machine Learning actual data input y = H (X) prediction = H (X) hypothesis new input
  • 17. The Vision vs. Reality
  • 19. Machine Learning Poll #2 Syncsort Confidential and Proprietary - do not copy or distribute 19 Q2. Is Mainframe SMF and/or “log” data going into your big data platform/repository? o Yes, it is being streamed into it today o Yes, it goes into it via periodic batch/other input method o No, but that data has been requested/is desired o No o Don’t Know
  • 20. Reminder 20 Syncsort Confidential and Proprietary - do not copy or distribute Type in your questions at any time during the presentation using the chat window. We will answer them during our Q&A session following the presentations or afterward.
  • 21. Examples 21 Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. Critical Machine Data  Streamed to a Big Data Platform
  • 23. Critical Mainframe Machine Data  Normalized and Streamed to Splunk with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS
  • 24. Machine Data  Machine Learning Platform - High Level Architecture Send TCP Send HTTP Send Kafka Predictive Analytics With Machine Learning Splunk/ Hadoop/ Cloud Get TCP Get HTTP Consume Kafka Automation tools Other Apps Operator commands Dynamic reconfiguration Data collection Data Transformation Data lineage/Metering data feedback z/OS Ironstream Configuration GUI
  • 25. Splunk Platform Machine Learning Toolkit The Machine Learning Toolkit App delivers new SPL commands, custom visualizations, assistants, and examples to explore a variety of ml concepts. Assistants: – Predict Numeric Fields (Linear Regression): e.g. predict median house values. – Predict Categorical Fields (Logistic Regression): e.g. predict customer churn. – Detect Numeric Outliers (distribution statistics): e.g. detect outliers in IT Ops data. – Detect Categorical Outliers (probabilistic measures): e.g. detect outliers in diabetes patient records. – Forecast Time Series: e.g. forecast data center growth and capacity planning. – Cluster Numeric Events: e.g. Cluster Hard Drives by SMART Metrics
  • 26. The Basic Process of Machine Learning Clean and transform your data – To meet the analytics explicit requirements Fit the model – Toolkit features 27 algorithms for fitting models – Over 300 open source Python algorithms in the add-on Validate the model – Each assistant provides a few methods in the validate section Refine the model – Adjust the parameters to improve the metrics Deploy the model – Deployment actions fall into the following categories • Make prediction or forecast • Detect outliers and anomalies • Trigger or inform an action
  • 27. Splunk Platform Machine Learning Visualizations
  • 28. 2828 Use Case Areas Syncsort Confidential and Proprietary - do not copy or distribute • RACF/ACF2/TSS Authentications • TSO account & login activity • FTP sessions & file activity • Sensitive data access & movement (PII/PHI) • Configuration settings (e.g. FISMA) • IRS Pub 1075 • Incident triage • Response times/SLAs • Latencies • Exceptions • Resource utilization • Anomalous behavior detection • Glass table view of entire service • Predictive analytics Security Trouble- Shooting Health Monitoring Compliance
  • 29. Summary 29 Syncsort Confidential and Proprietary - do not copy or distribute
  • 30. Questions and More Information Additional Questions for David and Maggie? For More Information: syncsort.com/ironstream blog.syncsort.com/ Try Ironstream for Free: syncsort.com/ironstreamstarteredition Comments/Other: Steven Menges: smenges@syncsort.com 30 Syncsort Confidential and Proprietary - do not copy or distribute