SlideShare a Scribd company logo
Ironstream®
The Full Stack
Utilizing Mainframe Machine Data in
Security Operations
Ian Hartley | Senior Director, Product Management
Andrew Farley | Solutions Engineer
Housekeeping
Webinar Audio
• Today’s webcast audio is streamed through your
computer speakers
• If you need technical assistance with the web interface
or audio, please reach out to us using the Q&A box
Questions Welcome
• Submit your questions at any time during the
presentation using the Q&A box. If we don't get to your
question, we will follow-up via email
Recording and slides
• This webinar is being recorded. You will receive an email
following the webinar with a link to the recording and
slides
2
Themes
• Challenges around traditional
modernization approaches
• Impact to business
• Need for a comprehensive
Observability solution
• Demo of Ironstream for Security
Monitoring
3
Landscape of Digital Modernization is complex
4
Mainframes host the most critical applications
71%
Fortune 500
$2.9 Billion
Mainframe market by 2025
$2.5 Billion
Transactions / day / per MF
Top World
Banks
92 of World’s
Top Insurers
10 of Top 25
US Retailers
23
5
Leading IT operations platforms lack native
mainframe integration
Distributed and
Cloud environments
Mainframe Systems
Online
services
Storage
Online
Shopping
Cart
Servers
Desktops
Web
clickstreams
Security
Networks
Telecoms
Call detail
records
GPS
location
Messaging
Databases
RFID
Web
services
Packaged
applications
APP
Custom
apps
Energy
meters
Smartphones
and devices
On-
premises
Private
cloud
Public
cloud
IBM Z
Platform
6
Impact of data silos on IT teams
No single view of
IT infrastructure
Delayed SIEM
response
Operational
inefficiency
Trouble
maintaining
compliance
Lack of IT
resilience
Increased
downtime
7
Digging into SIEM
What is SIEM?
• Real-time analysis of security
alerts generated by applications
and network hardware
• Holistic, unified view into
infrastructure, workflow, policy
compliance and log management
• Monitor and manage user and
service privileges as well as
external threat data
Log Collection
Log Analysis
Event Correlation
Log Forensics
IT Compliance
Application Log Monitoring
Object Access Auditing
Real-Time Alerting
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
System/Device Log Monitoring
Log Retention
SIEM
Security Information and Event Management
9
The SIEM market is growing
$3.41 billion in 2020 to $4.10 billion in 2021
20% growth rate after 3.9% decline
Maturing at a rapid pace but still competitive
10 Source: https://www.gartner.com/reviews/market/security-information-event-management
And security use cases are expanding
11
Threat detection Response Exposure Management Compliance
Source: https://www.gartner.com/reviews/market/security-information-event-management
Splunk Enterprise Security
12
Splunk Enterprise Security
ACF2 items
13
Delivered to
Splunk
Visibility into
usage, trends,
projections
Improve
security posture
Identify issues
& anomalies
faster
Greater IT
resilience
14
Demo
Questions?
https://www.precisely.com/product/ironstream

More Related Content

PPTX
Increase Security Observability with IBM i Machine Data
PPTX
IBM i HA and Security: Why They Need to Work Together
PDF
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
PPTX
Enhancing IT Operations Analytics with IBM i Machine and Log Data
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
3 steps to gain control of cloud security
PPTX
Preventing Downtime with Better IT Operations Management
PPTX
Effective Security Monitoring for IBM i: What You Need to Know
Increase Security Observability with IBM i Machine Data
IBM i HA and Security: Why They Need to Work Together
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Enhancing IT Operations Analytics with IBM i Machine and Log Data
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
3 steps to gain control of cloud security
Preventing Downtime with Better IT Operations Management
Effective Security Monitoring for IBM i: What You Need to Know

Similar to Utilizing Mainframe Machine Data in Security Operations (20)

PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Government Agencies Using Splunk: Is Your Critical Data Missing?
PPTX
IBM i Security: Identifying the Events That Matter Most
PPTX
SIEM - Your Complete IT Security Arsenal
PPT
dataProtection_p3.ppt
PPTX
Learnings of how to simplifying io t solutions and securing business value
PDF
IBM in Surveillance: Solutions that Deliver Innovation
PPTX
IBM i Security SIEM Integration
PPT
System Z Mainframe Security For An Enterprise
PDF
EMEA10: Trepidation in Moving to the Cloud
PDF
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
PDF
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
PDF
Cybersecurity
PDF
Infographic-1-MainFrame BlindSpots_082015
PPTX
Managing security threats in today’s enterprise
PDF
IBM QRadar Security Intelligence Overview
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Government Agencies Using Splunk: Is Your Critical Data Missing?
IBM i Security: Identifying the Events That Matter Most
SIEM - Your Complete IT Security Arsenal
dataProtection_p3.ppt
Learnings of how to simplifying io t solutions and securing business value
IBM in Surveillance: Solutions that Deliver Innovation
IBM i Security SIEM Integration
System Z Mainframe Security For An Enterprise
EMEA10: Trepidation in Moving to the Cloud
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Improve IT Security and Compliance with Mainframe Data in Splunk
Why Integrating IBM Z into ServiceNow and Splunk Is So Important
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
Cybersecurity
Infographic-1-MainFrame BlindSpots_082015
Managing security threats in today’s enterprise
IBM QRadar Security Intelligence Overview
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf
Ad

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine Learning_overview_presentation.pptx
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology
Assigned Numbers - 2025 - Bluetooth® Document
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
A comparative analysis of optical character recognition models for extracting...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Utilizing Mainframe Machine Data in Security Operations

  • 1. Ironstream® The Full Stack Utilizing Mainframe Machine Data in Security Operations Ian Hartley | Senior Director, Product Management Andrew Farley | Solutions Engineer
  • 2. Housekeeping Webinar Audio • Today’s webcast audio is streamed through your computer speakers • If you need technical assistance with the web interface or audio, please reach out to us using the Q&A box Questions Welcome • Submit your questions at any time during the presentation using the Q&A box. If we don't get to your question, we will follow-up via email Recording and slides • This webinar is being recorded. You will receive an email following the webinar with a link to the recording and slides 2
  • 3. Themes • Challenges around traditional modernization approaches • Impact to business • Need for a comprehensive Observability solution • Demo of Ironstream for Security Monitoring 3
  • 4. Landscape of Digital Modernization is complex 4
  • 5. Mainframes host the most critical applications 71% Fortune 500 $2.9 Billion Mainframe market by 2025 $2.5 Billion Transactions / day / per MF Top World Banks 92 of World’s Top Insurers 10 of Top 25 US Retailers 23 5
  • 6. Leading IT operations platforms lack native mainframe integration Distributed and Cloud environments Mainframe Systems Online services Storage Online Shopping Cart Servers Desktops Web clickstreams Security Networks Telecoms Call detail records GPS location Messaging Databases RFID Web services Packaged applications APP Custom apps Energy meters Smartphones and devices On- premises Private cloud Public cloud IBM Z Platform 6
  • 7. Impact of data silos on IT teams No single view of IT infrastructure Delayed SIEM response Operational inefficiency Trouble maintaining compliance Lack of IT resilience Increased downtime 7
  • 9. What is SIEM? • Real-time analysis of security alerts generated by applications and network hardware • Holistic, unified view into infrastructure, workflow, policy compliance and log management • Monitor and manage user and service privileges as well as external threat data Log Collection Log Analysis Event Correlation Log Forensics IT Compliance Application Log Monitoring Object Access Auditing Real-Time Alerting User Activity Monitoring Dashboards Reporting File Integrity Monitoring System/Device Log Monitoring Log Retention SIEM Security Information and Event Management 9
  • 10. The SIEM market is growing $3.41 billion in 2020 to $4.10 billion in 2021 20% growth rate after 3.9% decline Maturing at a rapid pace but still competitive 10 Source: https://www.gartner.com/reviews/market/security-information-event-management
  • 11. And security use cases are expanding 11 Threat detection Response Exposure Management Compliance Source: https://www.gartner.com/reviews/market/security-information-event-management
  • 14. Delivered to Splunk Visibility into usage, trends, projections Improve security posture Identify issues & anomalies faster Greater IT resilience 14
  • 15. Demo

Editor's Notes

  • #6: Mainframes are still the backbone for the biggest organizations in the world 71% of the fortune 500 rely on the mainframe for their mission critical transactional systems and they are present in every vertical from FinServ to Insurance to Retail. When talking to these organizations, it’s not unusual to hear that up to 80% of their corporate data originates on the mainframe and that business is growing. The mainframe market is expected to grow to $2.9 billion by 2025.
  • #8: Talk Track: And data silos can be a big deal. Organizations can feel the impact of these data silos in several different ways. The overall problem is the lack on a true 360-enterprise view of the IT infrastructure. There is no way for IT teams to see all of the aspects of their environment and how they interact with each other, which snowballs into several other problems that can affect the time, money, and reputation of the team if something goes wrong. The health and status of these legacy systems is unknown, so if an incident occurs that involves the mainframe or IBM i it can takes teams a long time to determine that. They may even need to get an IBM systems SME or consultant involved. Requiring this extra involvement from a 3rd party is a challenge in itself due to the fact that expertise around these systems is rapidly shrinking. Even after the experts get involved, teams still need to figure out what is wrong. This results in long MTTIs (mean time to identification) and long MTTRs (mean time to resolution). These are often a metric of success for IT ops teams, so if they are very high upper levels of management may need to get involved and the team could lose support from these executives. All of these factors culminate in a mismanagement of resources. There is so much time spent trying to understand what is happening with the mainframe and IBM i that it takes away from teams actual day jobs. Not to mention all of the extra money being spent on an IBM systems SME. PURPOSE: The negative consequences of disconnection.
  • #10: Patrick SIEM technology aggregates and provides real-time analysis of security alerts using event data produced by security devices, network infrastructure components, systems, and applications. A primary function of SIEM is to analyze security event data in real-time for internal and external threat detection to prevent potential hacks and data loss. This typically includes user behavior analytics (UBA) – understanding user behavior and how it might impact security. SIEM technologies also collect, store, analyze and report on data needed for regulatory compliance to ensure that audit requirements are met as dictated.
  • #12: Threat detection: Real-time analytics Batch analytics Data science algorithms User- and entity-based analytics Response: SOAR Incident management Collaboration Exposure management: Asset details (criticality, grouping, location, patch status, etc.) User details (criticality, peer grouping, business unit, role, incident history, etc.) Configuration posture (cloud asset configuration, GPO settings, etc.) Poly-cloud visibility and unified exposure understanding Threat detection framework alignment Compliance: Reporting Continuous monitoring requirements Audits Security system of record
  • #13: There are also integrations with some Splunk Premium products…namely… IT Service Intelligence for monitoring key performance indicators and health of business services And Enterprise security integration for out of the box security surveillance
  • #14: There are also integrations with some Splunk Premium products…namely… IT Service Intelligence for monitoring key performance indicators and health of business services And Enterprise security integration for out of the box security surveillance
  • #15: IT operations and security use cases can all be played across these tools and platforms. Even combinations of these many different use cases. From simple visibility…to operational insights…finding issues and resolving them quickly before your customers are aware…to improving your security, compliance and audit posture. These are all possible…at your own pace…and in-line with your common or even unique requirements.