Identifying Security Risks Using The Mainframe Security Insig

identifying security risks using the Mainframe security insig
identifying security risks using the Mainframe security insig

Identifying Security Risks Using The Mainframe Security Insig If you missed our june 7, 2022 webcast titled "identifying security risks using the mainframe security insights platform" presented by @balamurugan venkatachalam and @narender eshwar sajnani, this video is the recording of that session. i've also attached bala and narender's presentation to this post. This video is the recording of our broadcom mainframe software community webcast of the same name originally held sted on june 7, 2022.

An 8 Step risk Assessment For Your Facility S security Facilities
An 8 Step risk Assessment For Your Facility S security Facilities

An 8 Step Risk Assessment For Your Facility S Security Facilities Today’s mainframe is connected to the outside world more than ever. this increased connectivity and the rapidly evolving risks associated with insider threats, code based vulnerabilities, human errors, hackers, and ransomware, force you to proactively evaluate your mainframe’s security posture and understand the security risk. Simplify security activities. security insights platform helps ensure a trusted environment for your customers and employees by easily identifying and reducing risk from threats. it can quickly interpret and assess the security posture of your mainframe. and, for risky findings, it helps develop remediation steps –all on an ongoing and ad hoc. Using. reports and risk configurations so that you can identify and reduce risks to your mainframe. aggregates data from your mainframe environment and its security products into reports that offer insights into your mainframe security posture. with this information, you can take steps to remediate risks to your mainframe. As a security administrator, you must develop and implement a plan to reduce access to system critical resources. to do so, you first identify which users can access those system critical resources. then, you can begin reducing access to those resources to adhere to the principle of least privilege and to reduce risk to your mainframe data.

Comments are closed.