SlideShare a Scribd company logo
Mary Ann Furno—Product Owner
Mainframe
CA Technologies
MFT28T
The Known Unknown—Finding Lost, Abandoned and
Hidden Regulated or Sensitive Data on the Mainframe
TechTalk
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Can you easily identify exactly what files are
regulated or sensitive data on the mainframe? If
not, stop by and listen to our experts show you
how you can.
Mary Ann
Furno
CA Technologies
Product Owner
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Product/Technology Architecture
Execution
Policy
Web GUI
Control Scans
Reporting
Classification
Engine:
z/OS
Data Sources
VSAM
DB2
PS
API
3rd party 3rd party
CA Compliance
Event
Manager
PDS/
PDSE
…
Description of Technology
Overview of Technology
 CA Data Content Discovery
“scans” data, identifying
data vulnerabilities and
risks to compliance.
Lands Lightly
 Product has no other CA
product dependencies or
other prerequisites,
installs in <1 day.
CA DCD
Repository
I’d like to see all an aggregate list of all data
sources that contain primary account numbers
for scans that I ran in the past seven days.
CA Data Content Discovery
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect It
Prior to sending a dump data set, I’d like to scan
to ensure it does not contain sensitive or
regulated information.
CA Data Content Discovery
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Find It: Define Scope
Our remediation steps include finding out who
has access to regulated or sensitive data and
validating the access and access level.
CA Data Content Discovery
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect it: Who has access to the sensitive data?
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect it: Who has access to the sensitive data?
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Data Content Discovery Promise
FIND IT CLASSIFY IT PROTECT IT
For CISO, MF Security Director FOR CISO, Internal Audit, Risk Officer
FOR MF Security analysts, MF Data
analyst
The first data-pattern scanning
capability uniquely natively on
mainframe in the market
Simple and modern GUI along with
Flexible scheduling designed for
both z and non-IBM z personnel
Eliminate risky offloading- with data
security right on the mainframe.
Only data security product on the
market for mainframe to use
specialty engines to reduce upgrade
costs
Gain quick and critical insight about
the potential and magnitude of data
exposure on the mainframe.
Prove it to auditors that controls are
checked by data-types to satisfy
regulations.
Stay in control—eliminate risk while
reducing costs of data protection
processes.
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

PDF
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
PDF
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
PDF
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
PDF
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
PDF
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
PDF
CA Gen Exploration – What's New and Cool in Application Development
PDF
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
PDF
Getting the Most from Your CA Advanced Authentication Solution
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
CA Gen Exploration – What's New and Cool in Application Development
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
Getting the Most from Your CA Advanced Authentication Solution

What's hot (20)

PDF
Technology Primer: Customize CA Application Performance Management With Tip...
PDF
Creating an Omnichannel Experience for Your Customers
PDF
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
PDF
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
PDF
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
PDF
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
PDF
The Automation Maturity Curve: Taking IT to New Levels
PDF
Hands-On Lab: Increase Velocity with the CA Performance Management OpenAPI ...
PDF
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
PDF
CA Project and Portfolio Management Budgeting & Forecasting
PDF
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
PDF
Ten Things You Should not Forget in Mainframe Security
PDF
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
PDF
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
PDF
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
PDF
Output Management Solutions from CA Technologies: More Than Just Printing
PDF
CA PPM 14.x Agile Integrations
PDF
How to Leverage New Capabilities in the CA Identity Suite
PDF
Ensuring Effective Service Management in the Application Economy
PDF
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Technology Primer: Customize CA Application Performance Management With Tip...
Creating an Omnichannel Experience for Your Customers
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
The Automation Maturity Curve: Taking IT to New Levels
Hands-On Lab: Increase Velocity with the CA Performance Management OpenAPI ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
CA Project and Portfolio Management Budgeting & Forecasting
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Ten Things You Should not Forget in Mainframe Security
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Output Management Solutions from CA Technologies: More Than Just Printing
CA PPM 14.x Agile Integrations
How to Leverage New Capabilities in the CA Identity Suite
Ensuring Effective Service Management in the Application Economy
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Ad

Viewers also liked (15)

PPTX
El toro captive audience deck
PDF
2016 Vizocom Company Profile
DOC
Myriam resume updated bank
PDF
Prova final - unidade ii
PDF
FirstPath-Autism-Intrduction
PPS
Material Existence Prem Kumar+Kondaparthi0522
PPTX
Σχολείο ΑΕΠ (Συνάντηση 1)
PDF
Strategy Drives Function and Form - Pursuing a World-Class System for Health ...
PPTX
Tata hitachi
PPTX
PPS
Futurism 2009
PPTX
SHEAR CENTRE
PDF
Estudio de mecanica de suelos con fines de cimentacion
PPTX
PERFORMANCE CHARACTERISTICS OF MATERIALS(PRODUCT DESIGN SEMINAR TOPIC)
PDF
Shoot 3 contact sheet
El toro captive audience deck
2016 Vizocom Company Profile
Myriam resume updated bank
Prova final - unidade ii
FirstPath-Autism-Intrduction
Material Existence Prem Kumar+Kondaparthi0522
Σχολείο ΑΕΠ (Συνάντηση 1)
Strategy Drives Function and Form - Pursuing a World-Class System for Health ...
Tata hitachi
Futurism 2009
SHEAR CENTRE
Estudio de mecanica de suelos con fines de cimentacion
PERFORMANCE CHARACTERISTICS OF MATERIALS(PRODUCT DESIGN SEMINAR TOPIC)
Shoot 3 contact sheet
Ad

Similar to The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive Data on the Mainframe (20)

PDF
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
PDF
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
PDF
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
PDF
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
PDF
Mainframe Software Management Made Easier
PDF
Evolving Role of System z in the Application Economy
PDF
How Can Test Data Management Overcome Mainframe Testing Challenges?
PPTX
CA View® and CA Deliver™ – Product Overview
PDF
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
PDF
Tech Talk: Five Simple Steps to a More Powerful Database Experience
PDF
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
PPTX
CA Client Automation_r14_Latestkhjlhjkljljh
PDF
Big Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe Data
PDF
IT Network Asset Discovery & Inventory
PDF
Taking IT Analytics to the Next Level
PPT
Sanctuary Device Control
PDF
CA Identity Suite – Extending Identity Management to the Business User
PDF
Instalacion Agente Java Introscope 9.5
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
Mainframe Software Management Made Easier
Evolving Role of System z in the Application Economy
How Can Test Data Management Overcome Mainframe Testing Challenges?
CA View® and CA Deliver™ – Product Overview
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
CA Client Automation_r14_Latestkhjlhjkljljh
Big Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe Data
IT Network Asset Discovery & Inventory
Taking IT Analytics to the Next Level
Sanctuary Device Control
CA Identity Suite – Extending Identity Management to the Business User
Instalacion Agente Java Introscope 9.5

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
How Components Increase Speed and Risk
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
How Components Increase Speed and Risk

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars

The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive Data on the Mainframe

  • 1. Mary Ann Furno—Product Owner Mainframe CA Technologies MFT28T The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive Data on the Mainframe TechTalk
  • 2. For Informational Purposes Only Terms of this Presentation © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Can you easily identify exactly what files are regulated or sensitive data on the mainframe? If not, stop by and listen to our experts show you how you can. Mary Ann Furno CA Technologies Product Owner
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Product/Technology Architecture Execution Policy Web GUI Control Scans Reporting Classification Engine: z/OS Data Sources VSAM DB2 PS API 3rd party 3rd party CA Compliance Event Manager PDS/ PDSE … Description of Technology Overview of Technology  CA Data Content Discovery “scans” data, identifying data vulnerabilities and risks to compliance. Lands Lightly  Product has no other CA product dependencies or other prerequisites, installs in <1 day. CA DCD Repository
  • 5. I’d like to see all an aggregate list of all data sources that contain primary account numbers for scans that I ran in the past seven days. CA Data Content Discovery
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Protect It
  • 7. Prior to sending a dump data set, I’d like to scan to ensure it does not contain sensitive or regulated information. CA Data Content Discovery
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Find It: Define Scope
  • 9. Our remediation steps include finding out who has access to regulated or sensitive data and validating the access and access level. CA Data Content Discovery
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Protect it: Who has access to the sensitive data?
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Protect it: Who has access to the sensitive data?
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Data Content Discovery Promise FIND IT CLASSIFY IT PROTECT IT For CISO, MF Security Director FOR CISO, Internal Audit, Risk Officer FOR MF Security analysts, MF Data analyst The first data-pattern scanning capability uniquely natively on mainframe in the market Simple and modern GUI along with Flexible scheduling designed for both z and non-IBM z personnel Eliminate risky offloading- with data security right on the mainframe. Only data security product on the market for mainframe to use specialty engines to reduce upgrade costs Gain quick and critical insight about the potential and magnitude of data exposure on the mainframe. Prove it to auditors that controls are checked by data-types to satisfy regulations. Stay in control—eliminate risk while reducing costs of data protection processes.
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15