advertise your website Login Registration
 
 
 
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
 
HostJinni Promotions
Articles Category
Arts & Entertainment
Automotive
Business
Cancer
Careers
Communications
Computers & Technology
Finance
Food & Drink
Gaming
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Insurance
Just for Women
Kids & Teens
Legal
News & Society
Online Business
Online Tickets
Pets
Real Estate
Reference and Education
Relationships
Self Improvement
Shopping
Sports & Recreation
Travel & Tourism
Writing
  Member Area
Author Login
Free Registration
Authors From Country
 
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
 
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
Archive
  WebZine Status
Total Articles -25190
Registered Authors - 4482
Featured Articles - 340
Articles added this
month - 97
 

Mainframe Security

    -    
For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Banks, insurance companies, government entities and credit card companies are few of them. The important mainframe features in this regard are reliability, serviceability, scalability, performance and last but not the least security. To protect millions of daily transactions, the utilization of security features has to be strictly administered. The currently available mainframe security products include RACF from IBM, Top Secret and ACF2 from CA Technologies. Among them RACF (Resource Access Control Facility) is the most commonly used product.

Earlier when systems used to be mostly operated by single users, security was not a big concern for the Organizations. With the availability of multi-application, multi-user and multi-task Mainframe environments the enterprises became more aware of the resource protection from unauthorized access. The components of IBM security software are listed below:

•LDAP (Lightweight Directory Access Protocol) server for accessing and maintaining distributed directory information over an IP network

•DCE Security Server to provide distributed computing environment.

•Network Authentication Service to provide security service without the need of a middleware product.

•z/OS Firewall Technologies to allow a safe mainframe connection to Internet.

•PKI Services to issue digital certificates for both internal and external users. It also helps in public key set up.

•Enterprise Identity Mapping to manage multiple user identities in an enterprise environment.

•RACF, an add-on software product, holds information about users, resources and database access. It verifies user identities and raises resource request. The access control tasks of RACF are as follows:

•Identification and verification of users as well as identification, classification and protection of system resources

•User authorization for protected access to the resources

•Access control to data, system software and applications at read, write, update and delete modes

•Creation of a centralized and decentralized security administration

•Support for digital certificates and cryptographic services

•Auditing without any modification in the applications

•Logging and reporting of attempts to access protected resources without proper authorization

Digital certificates, case sensitive IDs and passwords as well as public key infrastructure services are the latest security features which are also supported by RACF. The password identification policy of RACF includes minimum length, use of numeric characters and capital letters, lack of repeating characters etc. Although the new security products ACF2 and Top Secret from CA technologies are in market, RACF remains the best choice for providing security in Mainframe environment.
 
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     0 votes, average: out of 5    
About Author
   
Articles Stats
  Published Date - June 28 2013
  Total Views - 37
  Total Votes - 0
  Average Rating - 0
  Comments - 0
  Mr. Nate Rodnay
Since 1982, Software Diversified Services (SDS) is providing first-quality software and technical support for IBM mainframes and VM, VSE, and mainframe. SSH SFTP from SDS secures ftp transactions on the mainframe network. At sdsusa.com you can find product trials and webcasts of other mainframe software tools from Software Diversified Services.
 
Particular Article
 
Author Article
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • Z/OS SFTP
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
  • Common Features of an Effective Property and Casualty Insurance Software System
  • [2013-06-11 ]
    Today\'s Property & Casualty (P&C) insurance software systems utilizing modern technological platforms have gained popularity in the insurance industry. Read More...
  • MSG To PST Converter – Worthy Assistance To Shift MSG Emails To PST
  • [2013-06-11 ]
    Due to some reasons, MSG to PST transition becomes the need of MSG users and to fulfill this requirement MSG to PST Converter can help intelligently. Read More...
  • What is OSA Express?
  • [2013-06-11 ]
    OSA Express is a family of adapters, which provides direct mainframe-to-network attachment. Read More...
  • Convert MSG To PST To Obtain All The Outlook Benefits
  • [2013-06-11 ]
    This article contains information about MSG file and PST file, reasons for convert MSG to PST and source via which conversion can be done. MSG to PST converter can be utilized for this need. Read More...
     
     
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles (webzinearticles.com) is a registered trademark. All Rights Reserved. 2012