SlideShare a Scribd company logo
Ed Hallock – Director of Product Marketing
and Management
Old Dogs, New Tricks: Big Data from and for
Mainframe IT
Housekeeping
• Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please reach out
to us using the chat window.
• Questions Welcome:
– Submit your questions at any time during the presentation using the chat
window.
– We will answer them during our Q&A session following the presentations.
• Recording and Slides:
– This webcast is being recorded. You will receive an email following the webcast
with a link to download both the recording and the slides.
© 2016 Syncsort Incorporated
Today’s Presenter
Syncsort Confidential and Proprietary - do not copy or distribute
Ed Hallock is a highly experienced Information Technology Professional
with a broad experience base in software product development, support,
product management, marketing, and business development. In his
diverse career Ed has benefited from working for some of the largest
independent software vendors, in a variety of roles, providing enterprise
solutions to Global 1000 corporations. Ed has extensive experience in
performance and availability management for systems and applications.
He holds a bachelor’s degree in Computer Science from Montclair State
University in Upper Montclair, New Jersey and has presented at numerous
industry events as well as corporate related conferences and seminars.
Agenda
Big Iron to Big Data Analytics Challenge
State of the mainframe
IT Operations Analytics
Security Information and Event Management
IT Service Intelligence
Summary and Q&A
Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron to Big Data Analytics Challenge
So many data sources
– SMF, Syslog, Log4j web and application logs, RMF, RACF,
USS files and standard datasets
Volume of data
– Millions of SMF records generated daily
Format of data
– Complex data structures (SMF) with headers, product
sections, data sections, variable length and self-describing
– EBCDIC not recognized outside of the mainframe world
– Binary flags and fields
Difficult to get the information in a timely manner
– Not real-time, typically have to wait overnight for an
offload
Syncsort Confidential and Proprietary - do not copy or distribute
What Has Been Done in the Past?
Performance Monitors
– Proactively analyze and manage z/OS
operating systems, databases other z/OS sub-
systems for optimal performance
– Very good at detecting bottlenecks and other
potential performance problems in z/OS,
CICS, IMS, DB2, MQ, Storage, etc.
– Most include historical reporting and trending
facilities but that is typically limited to a
subset of the data that the monitor collects
Capacity Planning Tools
– Next day, next week, next month reporting of
offloaded SMF data
Event Management Systems
– Alert management
Syncsort Confidential and Proprietary - do not copy or distribute
Challenges with these Legacy Technologies
Tend to have fixed displays with little room for
customization on how an end-user can see
data provided
The interface(s) to these products have
traditionally been closed and proprietary
Limited view into security issues and threats
Limited ability to monitor business services
and provide service-level intelligence
Syncsort Confidential and Proprietary - do not copy or distribute
They typically have a silo approach: a monitor for DB2, another monitor for
CICS, etc. without any real correlation between the different pieces
Require Subject Matter Experts (SMEs) with in depth technical knowledge of
z/OS and its sub-systems in order to effectively use the products
Most have evolved into very complex and resource intensive solutions in an
attempt to cover ever aspect of the systems they monitor
8
Big Iron Trends to Watch for in 2017: Big data analytics for operational intelligence,
security, and compliance will continue to grow and emerge as a critical project in organizations.
9Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron Trends to Watch for in 2017: Increased interest for real-time access to mainframe
machine data (SMF, RMF, log data, etc.) for business analytics
10Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron Trends to Watch for in 2017: Mainframe-based tools and batch processes will
have to yield ground to new technologies including Hadoop, Spark, and Splunk for big data analytics.
11Syncsort Confidential and Proprietary - do not copy or distribute
Polling Question #1
What analytics platforms are you using today for z/OS IT operational intelligence:
 Splunk
 Hadoop
 ELK (Elastic Stack)
 Spark
 Custom/Home Grown solution
 None
12
What is Needed?
High performance, low-cost, platform for collecting critical system
information in real-time
Normalization of the z/OS data so it can be used off platform
analytics engines
Full analytics, visualization, and customization with no limitations
on what can be viewed
Ability to easily combine information from different data sources
and systems
Address the SME challenge: use by network managers, security
analysts, application analysts, enterprise architects without
requiring mainframe access or expertise
13Syncsort Confidential and Proprietary - do not copy or distribute
What is Needed?
It’s no longer about determining problems and preventing outages - unforced
IPL’s are a rarity
Need deeper analytic capabilities that includes integration across technology
silos
– IT Operational Analytics (ITOA)
• Capacity optimization vs. Capacity planning -- getting the most of existing
capacity vs. determining when to buy more
• Achieving operational efficiency
– Security Information and Event Management (SIEM)
• Security monitoring Threat detection
• Audit and regulatory compliance
– IT Service Intelligence (ITSI)
• Understanding IT component relationships and their impact on service delivery
• Business service responsiveness
14Syncsort Confidential and Proprietary - do not copy or distribute
IT OPERATIONS ANALYTICS (ITOA)
15Syncsort Confidential and Proprietary - do not copy or distribute
What is ITOA?
IT Operations Analytics (ITOA): an approach to IT operational data that allows for
better understanding and enabling better decisions about managing the IT
environment.
Applies Big Data principles to the IT environment providing a broader context—and
clearer operational intelligence—about what's happening.
Bigger picture of what's happening in the environment and make better decisions to
take control of the IT infrastructure.
16Syncsort Confidential and Proprietary - do not copy or distribute
ITOA: MSU 4-Hour RA with GP and zIIP Utilization by TOD
17Syncsort Confidential and Proprietary - do not copy or distribute
MSU 4-Hour
Rolling Avg. zIIP Utilization
by LPAR
CPU Utilization
by LPAR
ITOA: Analysis of SORT CPU Consumption
18Syncsort Confidential and Proprietary - do not copy or distribute
SORT CPU
Utilization by
TOD
SORT zIIP
Offload
Potential
SORT CPU
Utilization
by Date
SORT CPU
Utilization
by Day of
Week
ITOA: Abend Analysis
19Syncsort Confidential and Proprietary - do not copy or distribute
Abends Over Time
By LPAR & Abend Code
Prod vs. Test
ITOA: CICS Region Health Check
Syncsort Confidential and Proprietary - do not copy or distribute 20
Transaction Response Time Transaction Rates
Dispatch Time
SECURITY INFORMATION AND EVENT
MANAGEMENT(SIEM)
21Syncsort Confidential and Proprietary - do not copy or distribute
What is SIEM?
Security Information and Event Management (SIEM) technology aggregates and
provides real-time analysis of security alerts.
– Event data is produced by security devices, network infrastructures, systems
and applications. The primary source is log data (i.e., SMF RACF records).
Analyze security event data in real time for internal and external threat detection
and management.
– Every organization fears potential hacks and data loss.
Collect, store, analyze and report on log data for incident response, forensics and
regulatory compliance.
– Meeting audit requirements is a key initiative in many vertical industries
SIEM products are gaining additional analytics capabilities around user behavior
analytics (UBA) – understanding user behavior and how it might impact security
22Syncsort Confidential and Proprietary - do not copy or distribute
Examples of SIEM Use Cases on z/OS
Detect Data Movements
– Inbound/Outbound FTP
Dataset access operations
– Determine potential security threats based on unauthorized access attempts
– Ensure only authorized users are accessing critical datasets
Privileged/non-privileged User Activity Monitoring
– Unusual behavior pattern – off hours connections
– High number of invalid logon attempts
Attack Detection
– Intrusion, Scans, Floods
Authentication Anomalies
– Entered the building at 08:30 but logged on from another country at 09:00
Network Traffic Analysis
– High data volumes from a device/server
23Syncsort Confidential and Proprietary - do not copy or distribute
SIEM: TSO Account & FTP Activity
Syncsort Confidential and Proprietary - do not copy or distribute 24
Job Initiations
TSO Account Activity
TSO Lockouts
FTP Session Activity
FTP Transfer Activity
SIEM: Intrusion Detection & TCP/IP Traffic
25Syncsort Confidential and Proprietary - do not copy or distribute
Intrusion Detection showing Port Scans and
Denial of Service Attacks
TCP/IP Network Traffic
SIEM: Dataset Access Analysis
26Syncsort Confidential and Proprietary - do not copy or distribute
Access by type for critical datasets by
user name
SIEM: RACF Violations and Message Trends
Syncsort Confidential and Proprietary - do not copy or distribute 27
RACF Violations by type RACF Violations by user
Trend message volumes today vs. same time last week and 2 weeks ago
Polling Question #2
What Security Information and Event Management (SIEM) platform is in use within
your Enterprise:
 IBM zSecure/QRadar
 Correlog
 Splunk Enterprise Security
 HP Arcsight
 Logrythm
 Other
28Syncsort Confidential and Proprietary - do not copy or distribute
IT SERVICE INTELLIGENCE (ITSI)
29Syncsort Confidential and Proprietary - do not copy or distribute
What is ITSI?
Delivers a central, unified view of critical IT services for powerful, data-driven
monitoring
Maps critical services with KPIs to easily pinpoint what matters most
Uses machine learning to detect patterns, dynamically adapt thresholds, highlight
anomalies and pinpoint areas of impact
Provides business and service context to prioritize incident investigation and triage
Supports drill downs to profile an entity and rapidly troubleshoot outages and
service degradations
30Syncsort Confidential and Proprietary - do not copy or distribute
Providing z/OS Metrics & Analysis to IT Service Intelligence
31Syncsort Confidential and Proprietary - do not copy or distribute
3 Levels of Information Needed
for a complete picture
Overall Mainframe Central Processor Complex
LPAR Logical Partition (virtual machine equivalent)
Software Components
 CICS online transaction processing
 DB2 database, typically used with CICS
Splunk Service Analyzer --
A Unified View of Critical Services
32
Problem with
Online Banking
Service View Across All 3 Levels
33
Critical services
CEC (Central
Electronic
Complex)
LPARs (logical
partitions)
CEC is Fine
LPARs OK?
Online Banking has DB2
problems
DB2 Deep Dive
34
Polling Question #3
What analytics platforms are you considering or evaluating to use for z/OS IT
operational intelligence:
 Splunk
 Hadoop
 ELK (Elastic Stack)
 Spark
 Custom/Home Grown solution
 Other
35
SUMMARY
36
Syncsort Confidential and Proprietary - do not copy or distribute
Summary: Where We Need to Go
Offload of z/OS operational and security data for deeper analytics
Adopt analytics platforms to address challenges
– Splunk, Hadoop, Spark, ELK, etc.
Have a 1-stop shop(platform) to address all the needs across the organization
– ITOA, SIEM, ITSI
Close the mainframe knowledge gap
– Standard browser interfaces vs. proprietary UI’s
– Normalization of mainframe specific data types(ex: EBCDIC to ASCII)
– Data models to simplify understanding the data
– Simplified customization to present desired metrics
37Syncsort Confidential and Proprietary - do not copy or distribute
Critical Mainframe Data 
Normalized and Streamed to Splunk with Ironstream®
Log4jFile
Loa
d
SYSLO
GSYSLOG
Dlogs
securit
y
SMF
50+
types
RMF
Up to
50,000
values
DB
2
SYSOU
T
Live/Stored
SPOOL
Data
Alerts
Network
Component
s
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Ironstream Apps Are Now On Splunk App Store (splunkbase)
39Syncsort Confidential and Proprietary - do not copy or distribute
https://splunkbase.splunk.com/
 Search Syncsort
Get Ironstream® for SYSLOG for free
40Syncsort Confidential and Proprietary - do not copy or distribute
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Industry Leader in Mainframe
Software Products
Thank You.
Questions?

More Related Content

PDF
Locking down server and workstation operating systems
PPTX
Webinar: Real IT Compliance with SolarWinds
PPTX
Government Webinar: Improving Security Compliance with IT Monitoring Tools
PPTX
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
PPTX
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
PPT
Ben Rothke - NBA for The Security Professional
PPTX
Improving System Upgrades and Patching using SolarWinds
PDF
MT50 Data is the new currency: Protect it!
Locking down server and workstation operating systems
Webinar: Real IT Compliance with SolarWinds
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
Ben Rothke - NBA for The Security Professional
Improving System Upgrades and Patching using SolarWinds
MT50 Data is the new currency: Protect it!

What's hot (20)

PPTX
Government Webinar: Five Essential IT Tools You Need Today
PPTX
Federal Webinar: Technical Update and Demo of New Features
PDF
Nexthink-See your infrastructure as never before!!
PDF
Nexthink_it_operations_white_paper
PPTX
HPE-Security update talk presented in Vienna to partners on 15th April 2016
PPT
It Capabilities.2009
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
PPTX
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
PDF
Simplify Troubleshooting With Context in Your Logs
PDF
PITA Technical and Business Session: Cybersecurity outside the office
PDF
Prism presentation
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PDF
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PPTX
Splunk for IT Operations
PDF
Afac device-security-july-7-2014v7-2
PDF
Whitepaper IBM Guardium Data Activity Monitor
Government Webinar: Five Essential IT Tools You Need Today
Federal Webinar: Technical Update and Demo of New Features
Nexthink-See your infrastructure as never before!!
Nexthink_it_operations_white_paper
HPE-Security update talk presented in Vienna to partners on 15th April 2016
It Capabilities.2009
Securing your IT infrastructure with SOC-NOC collaboration TWP
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
Simplify Troubleshooting With Context in Your Logs
PITA Technical and Business Session: Cybersecurity outside the office
Prism presentation
Tripwire Energy Working Group: Keynote w/Patrick Miller
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Splunk for IT Operations
Afac device-security-july-7-2014v7-2
Whitepaper IBM Guardium Data Activity Monitor
Ad

Similar to Old Dogs, New Tricks: Big Data from and for Mainframe IT (20)

PDF
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
PDF
Experiences in Mainframe-to-Splunk Big Data Access
PPTX
What Does Artificial Intelligence Have to Do with IT Operations?
PDF
State of the Mainframe for 2017
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
State of the Mainframe for 2017 (EMEA)
PDF
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
PDF
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
PDF
Fueling AI & Machine Learning: Legacy Data as a Competitive Advantage
PDF
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
PDF
360-Degree View of IT Infrastructure with IT Operations Analytics
PDF
The SIEM Buyer Guide the siem buyer guide
PDF
Enterprise Security in Mainframe-Connected Environments
PDF
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
PDF
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
PDF
El contexto de la integración masiva de datos
PPT
Real-Time Analytics for Industries
PPTX
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
PDF
Government Agencies Using Splunk: Is Your Critical Data Missing?
PPTX
Optimize the Value of Your Mainframe
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Experiences in Mainframe-to-Splunk Big Data Access
What Does Artificial Intelligence Have to Do with IT Operations?
State of the Mainframe for 2017
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
State of the Mainframe for 2017 (EMEA)
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Fueling AI & Machine Learning: Legacy Data as a Competitive Advantage
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
360-Degree View of IT Infrastructure with IT Operations Analytics
The SIEM Buyer Guide the siem buyer guide
Enterprise Security in Mainframe-Connected Environments
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
El contexto de la integración masiva de datos
Real-Time Analytics for Industries
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Government Agencies Using Splunk: Is Your Critical Data Missing?
Optimize the Value of Your Mainframe
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Encapsulation theory and applications.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Artificial Intelligence
PDF
Mushroom cultivation and it's methods.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
August Patch Tuesday
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Approach and Philosophy of On baking technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting Started with Data Integration: FME Form 101
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A Presentation on Touch Screen Technology
Zenith AI: Advanced Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
Encapsulation theory and applications.pdf
Hybrid model detection and classification of lung cancer
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Artificial Intelligence
Mushroom cultivation and it's methods.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
August Patch Tuesday
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DP Operators-handbook-extract for the Mautical Institute
Approach and Philosophy of On baking technology

Old Dogs, New Tricks: Big Data from and for Mainframe IT

  • 1. Ed Hallock – Director of Product Marketing and Management Old Dogs, New Tricks: Big Data from and for Mainframe IT
  • 2. Housekeeping • Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. • Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. • Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. © 2016 Syncsort Incorporated
  • 3. Today’s Presenter Syncsort Confidential and Proprietary - do not copy or distribute Ed Hallock is a highly experienced Information Technology Professional with a broad experience base in software product development, support, product management, marketing, and business development. In his diverse career Ed has benefited from working for some of the largest independent software vendors, in a variety of roles, providing enterprise solutions to Global 1000 corporations. Ed has extensive experience in performance and availability management for systems and applications. He holds a bachelor’s degree in Computer Science from Montclair State University in Upper Montclair, New Jersey and has presented at numerous industry events as well as corporate related conferences and seminars.
  • 4. Agenda Big Iron to Big Data Analytics Challenge State of the mainframe IT Operations Analytics Security Information and Event Management IT Service Intelligence Summary and Q&A Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. Big Iron to Big Data Analytics Challenge So many data sources – SMF, Syslog, Log4j web and application logs, RMF, RACF, USS files and standard datasets Volume of data – Millions of SMF records generated daily Format of data – Complex data structures (SMF) with headers, product sections, data sections, variable length and self-describing – EBCDIC not recognized outside of the mainframe world – Binary flags and fields Difficult to get the information in a timely manner – Not real-time, typically have to wait overnight for an offload Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. What Has Been Done in the Past? Performance Monitors – Proactively analyze and manage z/OS operating systems, databases other z/OS sub- systems for optimal performance – Very good at detecting bottlenecks and other potential performance problems in z/OS, CICS, IMS, DB2, MQ, Storage, etc. – Most include historical reporting and trending facilities but that is typically limited to a subset of the data that the monitor collects Capacity Planning Tools – Next day, next week, next month reporting of offloaded SMF data Event Management Systems – Alert management Syncsort Confidential and Proprietary - do not copy or distribute
  • 7. Challenges with these Legacy Technologies Tend to have fixed displays with little room for customization on how an end-user can see data provided The interface(s) to these products have traditionally been closed and proprietary Limited view into security issues and threats Limited ability to monitor business services and provide service-level intelligence Syncsort Confidential and Proprietary - do not copy or distribute They typically have a silo approach: a monitor for DB2, another monitor for CICS, etc. without any real correlation between the different pieces Require Subject Matter Experts (SMEs) with in depth technical knowledge of z/OS and its sub-systems in order to effectively use the products Most have evolved into very complex and resource intensive solutions in an attempt to cover ever aspect of the systems they monitor
  • 8. 8
  • 9. Big Iron Trends to Watch for in 2017: Big data analytics for operational intelligence, security, and compliance will continue to grow and emerge as a critical project in organizations. 9Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Big Iron Trends to Watch for in 2017: Increased interest for real-time access to mainframe machine data (SMF, RMF, log data, etc.) for business analytics 10Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. Big Iron Trends to Watch for in 2017: Mainframe-based tools and batch processes will have to yield ground to new technologies including Hadoop, Spark, and Splunk for big data analytics. 11Syncsort Confidential and Proprietary - do not copy or distribute
  • 12. Polling Question #1 What analytics platforms are you using today for z/OS IT operational intelligence:  Splunk  Hadoop  ELK (Elastic Stack)  Spark  Custom/Home Grown solution  None 12
  • 13. What is Needed? High performance, low-cost, platform for collecting critical system information in real-time Normalization of the z/OS data so it can be used off platform analytics engines Full analytics, visualization, and customization with no limitations on what can be viewed Ability to easily combine information from different data sources and systems Address the SME challenge: use by network managers, security analysts, application analysts, enterprise architects without requiring mainframe access or expertise 13Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. What is Needed? It’s no longer about determining problems and preventing outages - unforced IPL’s are a rarity Need deeper analytic capabilities that includes integration across technology silos – IT Operational Analytics (ITOA) • Capacity optimization vs. Capacity planning -- getting the most of existing capacity vs. determining when to buy more • Achieving operational efficiency – Security Information and Event Management (SIEM) • Security monitoring Threat detection • Audit and regulatory compliance – IT Service Intelligence (ITSI) • Understanding IT component relationships and their impact on service delivery • Business service responsiveness 14Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. IT OPERATIONS ANALYTICS (ITOA) 15Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. What is ITOA? IT Operations Analytics (ITOA): an approach to IT operational data that allows for better understanding and enabling better decisions about managing the IT environment. Applies Big Data principles to the IT environment providing a broader context—and clearer operational intelligence—about what's happening. Bigger picture of what's happening in the environment and make better decisions to take control of the IT infrastructure. 16Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. ITOA: MSU 4-Hour RA with GP and zIIP Utilization by TOD 17Syncsort Confidential and Proprietary - do not copy or distribute MSU 4-Hour Rolling Avg. zIIP Utilization by LPAR CPU Utilization by LPAR
  • 18. ITOA: Analysis of SORT CPU Consumption 18Syncsort Confidential and Proprietary - do not copy or distribute SORT CPU Utilization by TOD SORT zIIP Offload Potential SORT CPU Utilization by Date SORT CPU Utilization by Day of Week
  • 19. ITOA: Abend Analysis 19Syncsort Confidential and Proprietary - do not copy or distribute Abends Over Time By LPAR & Abend Code Prod vs. Test
  • 20. ITOA: CICS Region Health Check Syncsort Confidential and Proprietary - do not copy or distribute 20 Transaction Response Time Transaction Rates Dispatch Time
  • 21. SECURITY INFORMATION AND EVENT MANAGEMENT(SIEM) 21Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. What is SIEM? Security Information and Event Management (SIEM) technology aggregates and provides real-time analysis of security alerts. – Event data is produced by security devices, network infrastructures, systems and applications. The primary source is log data (i.e., SMF RACF records). Analyze security event data in real time for internal and external threat detection and management. – Every organization fears potential hacks and data loss. Collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. – Meeting audit requirements is a key initiative in many vertical industries SIEM products are gaining additional analytics capabilities around user behavior analytics (UBA) – understanding user behavior and how it might impact security 22Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. Examples of SIEM Use Cases on z/OS Detect Data Movements – Inbound/Outbound FTP Dataset access operations – Determine potential security threats based on unauthorized access attempts – Ensure only authorized users are accessing critical datasets Privileged/non-privileged User Activity Monitoring – Unusual behavior pattern – off hours connections – High number of invalid logon attempts Attack Detection – Intrusion, Scans, Floods Authentication Anomalies – Entered the building at 08:30 but logged on from another country at 09:00 Network Traffic Analysis – High data volumes from a device/server 23Syncsort Confidential and Proprietary - do not copy or distribute
  • 24. SIEM: TSO Account & FTP Activity Syncsort Confidential and Proprietary - do not copy or distribute 24 Job Initiations TSO Account Activity TSO Lockouts FTP Session Activity FTP Transfer Activity
  • 25. SIEM: Intrusion Detection & TCP/IP Traffic 25Syncsort Confidential and Proprietary - do not copy or distribute Intrusion Detection showing Port Scans and Denial of Service Attacks TCP/IP Network Traffic
  • 26. SIEM: Dataset Access Analysis 26Syncsort Confidential and Proprietary - do not copy or distribute Access by type for critical datasets by user name
  • 27. SIEM: RACF Violations and Message Trends Syncsort Confidential and Proprietary - do not copy or distribute 27 RACF Violations by type RACF Violations by user Trend message volumes today vs. same time last week and 2 weeks ago
  • 28. Polling Question #2 What Security Information and Event Management (SIEM) platform is in use within your Enterprise:  IBM zSecure/QRadar  Correlog  Splunk Enterprise Security  HP Arcsight  Logrythm  Other 28Syncsort Confidential and Proprietary - do not copy or distribute
  • 29. IT SERVICE INTELLIGENCE (ITSI) 29Syncsort Confidential and Proprietary - do not copy or distribute
  • 30. What is ITSI? Delivers a central, unified view of critical IT services for powerful, data-driven monitoring Maps critical services with KPIs to easily pinpoint what matters most Uses machine learning to detect patterns, dynamically adapt thresholds, highlight anomalies and pinpoint areas of impact Provides business and service context to prioritize incident investigation and triage Supports drill downs to profile an entity and rapidly troubleshoot outages and service degradations 30Syncsort Confidential and Proprietary - do not copy or distribute
  • 31. Providing z/OS Metrics & Analysis to IT Service Intelligence 31Syncsort Confidential and Proprietary - do not copy or distribute 3 Levels of Information Needed for a complete picture Overall Mainframe Central Processor Complex LPAR Logical Partition (virtual machine equivalent) Software Components  CICS online transaction processing  DB2 database, typically used with CICS
  • 32. Splunk Service Analyzer -- A Unified View of Critical Services 32 Problem with Online Banking
  • 33. Service View Across All 3 Levels 33 Critical services CEC (Central Electronic Complex) LPARs (logical partitions) CEC is Fine LPARs OK? Online Banking has DB2 problems
  • 35. Polling Question #3 What analytics platforms are you considering or evaluating to use for z/OS IT operational intelligence:  Splunk  Hadoop  ELK (Elastic Stack)  Spark  Custom/Home Grown solution  Other 35
  • 36. SUMMARY 36 Syncsort Confidential and Proprietary - do not copy or distribute
  • 37. Summary: Where We Need to Go Offload of z/OS operational and security data for deeper analytics Adopt analytics platforms to address challenges – Splunk, Hadoop, Spark, ELK, etc. Have a 1-stop shop(platform) to address all the needs across the organization – ITOA, SIEM, ITSI Close the mainframe knowledge gap – Standard browser interfaces vs. proprietary UI’s – Normalization of mainframe specific data types(ex: EBCDIC to ASCII) – Data models to simplify understanding the data – Simplified customization to present desired metrics 37Syncsort Confidential and Proprietary - do not copy or distribute
  • 38. Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream® Log4jFile Loa d SYSLO GSYSLOG Dlogs securit y SMF 50+ types RMF Up to 50,000 values DB 2 SYSOU T Live/Stored SPOOL Data Alerts Network Component s Ironstream API Application Data Assembler C COBOL REXX USS
  • 39. Ironstream Apps Are Now On Splunk App Store (splunkbase) 39Syncsort Confidential and Proprietary - do not copy or distribute https://splunkbase.splunk.com/  Search Syncsort
  • 40. Get Ironstream® for SYSLOG for free 40Syncsort Confidential and Proprietary - do not copy or distribute http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
  • 41. Industry Leader in Mainframe Software Products