Determining Who's Using What Network Encryption on Your z/OS System: zERT Is Coming!
				Project and Program: 
Enterprise Data Center, 
Security and Compliance
				Tags: 
Proceedings, 
SHARE Providence 2017, 
2017
		
		
		
			
		With so many corporate, industry, and government regulations regarding cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their key z/OS workloads.   But with four different protocols (TLS, SSL, SSH and IPSec), all of the cryptographic algorithms they support, and numerous ways to configure these protocols for different types of z/OS traffic, doing such an assessment can be daunting if not downright impossible.   This session describes a new z/OS V2R3 Communications Server feature called z/OS encryption readiness technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.-Chris Meyer-IBM Corporation
		
		
		
		
		
		
	
 Back to Proceedings File Library