Tuesdays at 12 pm EDT (9 am PDT) with a live demo on Thursdays at 2 pm EDT (11 am PDT)
The recent Verizon DBI* Report reveals that 81% of hacking-related breaches leveraged either stolen and/or weak user passwords? Now is the time to enlist your User Community in the common-sense defense of the z/OS mainframe perimeter. Find out how NewEra’s latest suite of tools - ICE/PSWD - can bridge that gap between your security environment and your users, especially your Privileged Users.
* Source: Verizon’s 2017 Data Breach Investigations Report
Tuesdays at 2 pm EDT (11 am PDT) - The ABC's of z/OS Integrity
z/OS - THE Trusted Computing Base
Find out how IBM established integrity within the z/OS system starting over 40 years ago beginning with its statement of integrity. In this presentation, we delve into how z/OS has became and continues to be the trusted computing base that is depended upon by so many businesses and institutions for critical applications and data.
Wednesdays at 12 pm ETD (9 am PDT) - Preparing for Your Next Upgrade of z/OS
Sooner than later, you will be planning for that next upgrade. What will you need to change in your system? Which system datasets will need to move; which can be left behind?
Just like moving to a new home, where we clean out what we no longer use; moving to your new system should also encourage you to move only those things that are still required or being used. How do you know what will be needed? What will need to be changed in your upgrade?
NewEra Software’s Integrity Controls Environment (ICE) has the tools to help you get the answers to those questions and many other questions about your z/OS configuration. Attend our webcasts to learn more about how ICE can help you save time and money in your planning and execution of your next z/OS upgrade.
BACK to Monthly webcast list
Integrity Controls Environment (ICE) helps you create and maintain a highly available, safer and more secure IT environment for your business applications, based on its ability to:
- Maintain and increase the availability of z/OS and therefore the access to applications that run on the mainframe;
- Lower the cost of providing z/OS services and administration protocols while automating change management and impact review, enforcing enterprise standardization and reducing risk;
- Extend security and controls beyond those provided by legacy security managers such as RACF, CA ACF2 or CA TSS. Reduce manual jeopardies in change management and increase real-time audit on administrative events.