SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Experiences in Mainframe-to-
Splunk® Big Data Access:
Learn What Your Peers are Doing
October 2016
Housekeeping
Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please
reach out to us using the chat window.
Questions Welcome:
– Submit your questions at any time during the presentation using the
chat window.
– We will answer them during our Q&A session following the
presentations.
Recording and Slides:
– This webcast is being recorded. You will receive an email following the
webcast with a link to download both the recording and the slides.
2
Session Abstract and Speakers
The requirement to add mainframe data to the stream of machine-to-machine or “log” data for
operational and security/compliance purposes is real. This webinar details 4 organizations who faced
these requirements and tells their individual stories as to what requirement/mandate they faced, what
options they considered, and how they ultimately addressed it. There will be a live Q&A for participants
to ask follow-up questions as to their stories and how they’re doing today.
3
etary - do not copy or distribute
David Friedman,
Senior Systems Engineer
Steven Menges, Director,
Product Management
Justin Eastman,
Senior Engineer
Big Data is No Longer a “Future”
Syncsort Confidential and Proprietary - do not copy or distribute 4
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
Mainframes Still Host the Most Critical Applications at Big Orgs
5
Syncsort Confidential and Proprietary - do not copy or distribute
71%
Fortune 500
2.5 BillionBus. Transactions / day / per MF
23of Top 25
US Retailers
of World’s
Top Insurers10Top World
Banks92
Source: IBM Organizations Overall2000+
Organization #1: Justin Eastman
6
Syncsort Confidential and Proprietary - do not copy or distribute
Justin Eastman,
Senior Engineer
Reminder:
Type in your questions at any time
during the presentation using the chat
window.
We will answer them during our Q&A
session following the presentations or
afterward.
USE CASE: THE NEED/PROBLEM
Incidents occurring in the organization would result
in the need to turn on additional CPUs to recover
from system being overloaded.
There was a need to get visibility into the health of
multiple sub-systems across different systems in
order to monitor to the load to proactively react to
these situations.
No single tool or monitor gave visibility into all the
different subsystems and across the entire
organization.
7
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Continue with the human flare gun approach currently
used in which multiple groups get involved elongating
the mean time to resolution.
Use existing monitors that require multiple sessions
and SMEs to access and perform triage.
Expand capacity to ensure that systems are not
overloaded.
Continue to rely on the customer to indicate when the
services provided become less responsive.
Look for a new solution to address their issues.
8
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
BIBD Solution to access z/OS log data in Splunk® for real-time
monitoring of critical subsystem performance
Creating single view into the health of all the systems and their
corresponding subsystems
Creating drill down dashboards that provide the KPIs to identify
where the source of the issue resides to that the immediate
source
Resulted in a significant reduction of MTTR and a
improve ability to detect problems before the
customer does.
9
Syncsort Confidential and Proprietary - do not copy or distribute
Big Data Poll
Syncsort Confidential and Proprietary - do not copy or distribute 10
Q1.Which Big Data analytics platforms does your company use today?
o Hadoop
o Splunk
o Other Data Warehouse
o Don’t Know
(Check all that apply)
Organization #2: David Friedman
11
Syncsort Confidential and Proprietary - do not copy or distribute
David Friedman,
Senior Systems Engineer
USE CASE: THE NEED/PROBLEM
12
Syncsort Confidential and Proprietary - do not copy or distribute
Customer had an audit and compliance mandate with
approaching deadline.
Using another product to manually retrieve information on a
daily basis.
Unable to monitor user log-on attempts, password changes,
and access violations on their mainframe environment.
Unable to obtain information in real-time.
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Home-grown solution option explored; determined
would not meet implementation deadline (and may
not have satisfied requirement).
POC bake-off (Syncsort Ironstream performed very well
in a POC against competitive product).
Validated the ability to replace the manual processes
they were using with Ironstream.
13
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
Monitoring security activity on their mainframe
applications to meet audit and compliance requirements
outlined in regulation, including:
– log-on attempts
– password changes
– user access violations
– other security events
Get the information in real-time (and eliminated manual
processes previously accomplished using zSecure)
Filtering enables selection of only the SMF records
needed to produce desired results
14
Syncsort Confidential and Proprietary - do not copy or distribute
Security
Compliance
Organization #3: Justin Eastman
15
Syncsort Confidential and Proprietary - do not copy or distribute
Justin Eastman,
Senior Engineer
USE CASE: THE NEED/PROBLEM
Security threats on the mainframe due to lack of
visibility.
Highly sensitive PHI (Protected Health Information)
escaping as data was moved from the production to
test environment despite having fences and an
automated scrubbing process.
Security information and event management (SIEM)
solution required.
16
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Do nothing and wait for an audit, or even worse, a
security exposure.
Attempt to perform post-exposure forensics.
Manually extract and process logs, SMF records, etc.
and produce audit reports to demonstrate compliance.
Do solution vendor search and utilize Gartner Magic
Quadrant, etc. for enterprise-class SIEM.
17
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
SIEM Solution (Gartner SIEM Leader Splunk®)
BIBD Solution to access z/OS log data in
Splunk® for real-time alerts (Splunk’s chosen mainframe partner
Ironstream)
Combined solution for mainframe logs
provides fast access to:
 Unusual data movements, amount of
movements, and protocols being used
 How much of the data movement is compliant,
non-compliant, or unknown
 Sources of inbound traffic relating to any
anomalies
18
Syncsort Confidential and Proprietary - do not copy or distribute
Organizational confidence in ability to audit data access compliance!
Big Iron to Big Data Poll
Syncsort Confidential and Proprietary - do not copy or distribute 19
Q2. Is Mainframe “log” data going into your big data platform/repository?
o Yes, it is being streamed into it today
o Yes, it goes into it via periodic batch/other input method
o No, but that data has been requested/is desired
o No
o Don’t Know
Organization #4: David Friedman
20
Syncsort Confidential and Proprietary - do not copy or distribute
David Friedman,
Senior Systems Engineer
Reminder:
Type in your questions at any time
during the presentation using the chat
window.
We will answer them during our Q&A
session following the presentations or
afterward.
USE CASE: THE NEED/PROBLEM
21
Syncsort Confidential and Proprietary - do not copy or distribute
Disbursed transaction information systems.
Current tools provide partial solutions.
Require comprehensive analytics across operation.
Enterprise IT Operational Analytics (ITOA) dashboard
desired.
USE CASE ALTERNATIVES: IN-HOUSE, OTHER
Organization selected Splunk® Enterprise as their ITOA
solution for distributed computing environment.
Considered Syncsort to access mainframe logs and get
comparable data from mainframe systems.
Conducted thorough POC of Ironstream in conjunction
with Splunk®
After POC, they were able to quickly start deploying it
as a comprehensive monitoring solution.
22
Syncsort Confidential and Proprietary - do not copy or distribute
USE CASE: SOLUTION AND RESULTS
Complete picture of overall system health.
Meaningful correlation of information from
disparate sources for faster triage and shorter
MTTR.
Company now able to monitor entire IT
infrastructure to detect potential issues before
they become critical.
23
Syncsort Confidential and Proprietary - do not copy or distribute
Reduce MTTR
Big Iron, Big Data and Big Iron to Big Data: Additional Use Cases?
24
Syncsort Confidential and Proprietary - do not copy or distribute
24
Syncsort Confidential and Proprietary - do not copy or distribute
Security & Compliance (SIEM)
• Access Control
• Data Movement
• Real-time Intrusion Detection
• Others?
IT Operations (ITOA)
• Systems Performance and
Tuning
• Capacity Planning
• Others?
IT Service Intelligence?
Other Monitoring & Analytics?
Big Iron
MVPs: Always Important, Big Iron and Big Data Functions, Staff Now Critical
25Syncsort Confidential and Proprietary - do not copy or distribute
“BMC Annual Mainframe Research Results 2015”1
Big Iron to Big Data Big Data
Syncsort Solutions for New and “Old” Requirements
26Syncsort Confidential and Proprietary - do not copy or distribute
High-performance sort for z/OS®
Best Sort for z Systems
Offload Copy & SMS Compression
and Sort work to zIIP processors
Savings with zIIP
Database Optimization Suites for
IBM DB2® and CA IDMS™
Network Management
z/OS® network management &
security components
Big Data integration with market-
leading support for integration and
access of mainframe and legacy data
sources
Data Access for Big Data
Collect, transform and stream
mainframe app and system log data
in near real time to Splunk Enterprise
Log Data Access for Big Data
High-performance Big Data integration
software – Linux/Unix/Windows;
Hadoop & Spark; on premise and
in the cloud
Big Data Integration
The most advanced sort features for
Unix, Linux, and Windows platforms
Best Sort for Distributed Platforms
Faster application modernization
with less hardware
AppMod
Big Iron Big Iron to Big Data Big Data
Data Funnel
Populate enterprise data lake
at the push of a button
Transparently migrate IMS to DB2
IMS and VSAM  DB2 Migration
Powerful new tools for your databases
Questions and More Information
Additional Questions for David and Justin?
For More Information:
syncsort.com/ironstream
blog.syncsort.com/
Try Ironstream for Free:
syncsort.com/ironstreamstarteredition
Comments/Other:
Steven Menges: smenges@syncsort.com
27
Syncsort Confidential and Proprietary - do not copy or distribute

Weitere ähnliche Inhalte

Was ist angesagt?

API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesAtif Ghauri
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Operational Intelligence Using Hadoop
Operational Intelligence Using HadoopOperational Intelligence Using Hadoop
Operational Intelligence Using HadoopDataWorks Summit
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations centerSatish Chavan
 
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...Precisely
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunk
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank PresentationSherrod Butler
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Projectvegasgirl1
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 

Was ist angesagt? (20)

API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Operational Intelligence Using Hadoop
Operational Intelligence Using HadoopOperational Intelligence Using Hadoop
Operational Intelligence Using Hadoop
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
Integrating IBM Z and IBM i Operational Intelligence Into Splunk, Elastic, an...
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Network Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac MwesigwaNetwork Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac Mwesigwa
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank Presentation
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Project
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
How to Migrate Without Downtime
How to Migrate Without DowntimeHow to Migrate Without Downtime
How to Migrate Without Downtime
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 

Andere mochten auch

Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenPrecisely
 
Introducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuiteIntroducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuitePrecisely
 
DevOps for the IBM Mainframe environment
DevOps for the IBM Mainframe environmentDevOps for the IBM Mainframe environment
DevOps for the IBM Mainframe environmentMicro Focus
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataPrecisely
 
Scale Splunk
Scale SplunkScale Splunk
Scale SplunkSplunk
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkSplunk
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentationjpelletier123
 
Workshop Logfile Analyse mit Splunk
Workshop Logfile Analyse mit SplunkWorkshop Logfile Analyse mit Splunk
Workshop Logfile Analyse mit SplunkHannes Richter
 

Andere mochten auch (9)

Mainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets ZenMainframe Customer Education Webcast: Syncsort Gets Zen
Mainframe Customer Education Webcast: Syncsort Gets Zen
 
Introducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuiteIntroducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver Suite
 
DevOps for the IBM Mainframe environment
DevOps for the IBM Mainframe environmentDevOps for the IBM Mainframe environment
DevOps for the IBM Mainframe environment
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
 
Splunk live beginner training nyc
Splunk live beginner training nycSplunk live beginner training nyc
Splunk live beginner training nyc
 
Scale Splunk
Scale SplunkScale Splunk
Scale Splunk
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
 
Workshop Logfile Analyse mit Splunk
Workshop Logfile Analyse mit SplunkWorkshop Logfile Analyse mit Splunk
Workshop Logfile Analyse mit Splunk
 

Ähnlich wie Access Mainframe Data in Splunk for Real-Time Monitoring and Compliance

Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Precisely
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Precisely
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Precisely
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 
Modeling and Forecasting – Effective Baselines for Capacity Management
Modeling and Forecasting – Effective Baselines for Capacity ManagementModeling and Forecasting – Effective Baselines for Capacity Management
Modeling and Forecasting – Effective Baselines for Capacity ManagementPrecisely
 
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...Jon Papp
 
Hadoop is Happening
Hadoop is HappeningHadoop is Happening
Hadoop is HappeningPrecisely
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimePrecisely
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingGeorg Knon
 
9 Hyperion Performance Myths and How to Debunk Them
9 Hyperion Performance Myths and How to Debunk Them9 Hyperion Performance Myths and How to Debunk Them
9 Hyperion Performance Myths and How to Debunk ThemDatavail
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALRisi Avila
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_dataGreg Hanchin
 
SplunkLive! Paris 2018: Legacy SIEM to Splunk
SplunkLive! Paris 2018: Legacy SIEM to SplunkSplunkLive! Paris 2018: Legacy SIEM to Splunk
SplunkLive! Paris 2018: Legacy SIEM to SplunkSplunk
 
Empowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine LearningEmpowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine LearningDataWorks Summit
 
SplunkLive! What's New in Splunk 6 Session
SplunkLive! What's New in Splunk 6 SessionSplunkLive! What's New in Splunk 6 Session
SplunkLive! What's New in Splunk 6 SessionSplunk
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Precisely
 

Ähnlich wie Access Mainframe Data in Splunk for Real-Time Monitoring and Compliance (20)

Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
 
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
Machine Learning & IT Service Intelligence for the Enterprise: The Future is ...
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Modeling and Forecasting – Effective Baselines for Capacity Management
Modeling and Forecasting – Effective Baselines for Capacity ManagementModeling and Forecasting – Effective Baselines for Capacity Management
Modeling and Forecasting – Effective Baselines for Capacity Management
 
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
 
Hadoop is Happening
Hadoop is HappeningHadoop is Happening
Hadoop is Happening
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
9 Hyperion Performance Myths and How to Debunk Them
9 Hyperion Performance Myths and How to Debunk Them9 Hyperion Performance Myths and How to Debunk Them
9 Hyperion Performance Myths and How to Debunk Them
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_data
 
SplunkLive! Paris 2018: Legacy SIEM to Splunk
SplunkLive! Paris 2018: Legacy SIEM to SplunkSplunkLive! Paris 2018: Legacy SIEM to Splunk
SplunkLive! Paris 2018: Legacy SIEM to Splunk
 
Empowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine LearningEmpowering you with Democratized Data Access, Data Science and Machine Learning
Empowering you with Democratized Data Access, Data Science and Machine Learning
 
SplunkLive! What's New in Splunk 6 Session
SplunkLive! What's New in Splunk 6 SessionSplunkLive! What's New in Splunk 6 Session
SplunkLive! What's New in Splunk 6 Session
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 

Mehr von Precisely

Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPrecisely
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsPrecisely
 

Mehr von Precisely (20)

Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Access Mainframe Data in Splunk for Real-Time Monitoring and Compliance

  • 1. Experiences in Mainframe-to- Splunk® Big Data Access: Learn What Your Peers are Doing October 2016
  • 2. Housekeeping Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. 2
  • 3. Session Abstract and Speakers The requirement to add mainframe data to the stream of machine-to-machine or “log” data for operational and security/compliance purposes is real. This webinar details 4 organizations who faced these requirements and tells their individual stories as to what requirement/mandate they faced, what options they considered, and how they ultimately addressed it. There will be a live Q&A for participants to ask follow-up questions as to their stories and how they’re doing today. 3 etary - do not copy or distribute David Friedman, Senior Systems Engineer Steven Menges, Director, Product Management Justin Eastman, Senior Engineer
  • 4. Big Data is No Longer a “Future” Syncsort Confidential and Proprietary - do not copy or distribute 4 DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values
  • 5. Mainframes Still Host the Most Critical Applications at Big Orgs 5 Syncsort Confidential and Proprietary - do not copy or distribute 71% Fortune 500 2.5 BillionBus. Transactions / day / per MF 23of Top 25 US Retailers of World’s Top Insurers10Top World Banks92 Source: IBM Organizations Overall2000+
  • 6. Organization #1: Justin Eastman 6 Syncsort Confidential and Proprietary - do not copy or distribute Justin Eastman, Senior Engineer Reminder: Type in your questions at any time during the presentation using the chat window. We will answer them during our Q&A session following the presentations or afterward.
  • 7. USE CASE: THE NEED/PROBLEM Incidents occurring in the organization would result in the need to turn on additional CPUs to recover from system being overloaded. There was a need to get visibility into the health of multiple sub-systems across different systems in order to monitor to the load to proactively react to these situations. No single tool or monitor gave visibility into all the different subsystems and across the entire organization. 7 Syncsort Confidential and Proprietary - do not copy or distribute
  • 8. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Continue with the human flare gun approach currently used in which multiple groups get involved elongating the mean time to resolution. Use existing monitors that require multiple sessions and SMEs to access and perform triage. Expand capacity to ensure that systems are not overloaded. Continue to rely on the customer to indicate when the services provided become less responsive. Look for a new solution to address their issues. 8 Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. USE CASE: SOLUTION AND RESULTS BIBD Solution to access z/OS log data in Splunk® for real-time monitoring of critical subsystem performance Creating single view into the health of all the systems and their corresponding subsystems Creating drill down dashboards that provide the KPIs to identify where the source of the issue resides to that the immediate source Resulted in a significant reduction of MTTR and a improve ability to detect problems before the customer does. 9 Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Big Data Poll Syncsort Confidential and Proprietary - do not copy or distribute 10 Q1.Which Big Data analytics platforms does your company use today? o Hadoop o Splunk o Other Data Warehouse o Don’t Know (Check all that apply)
  • 11. Organization #2: David Friedman 11 Syncsort Confidential and Proprietary - do not copy or distribute David Friedman, Senior Systems Engineer
  • 12. USE CASE: THE NEED/PROBLEM 12 Syncsort Confidential and Proprietary - do not copy or distribute Customer had an audit and compliance mandate with approaching deadline. Using another product to manually retrieve information on a daily basis. Unable to monitor user log-on attempts, password changes, and access violations on their mainframe environment. Unable to obtain information in real-time.
  • 13. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Home-grown solution option explored; determined would not meet implementation deadline (and may not have satisfied requirement). POC bake-off (Syncsort Ironstream performed very well in a POC against competitive product). Validated the ability to replace the manual processes they were using with Ironstream. 13 Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. USE CASE: SOLUTION AND RESULTS Monitoring security activity on their mainframe applications to meet audit and compliance requirements outlined in regulation, including: – log-on attempts – password changes – user access violations – other security events Get the information in real-time (and eliminated manual processes previously accomplished using zSecure) Filtering enables selection of only the SMF records needed to produce desired results 14 Syncsort Confidential and Proprietary - do not copy or distribute Security Compliance
  • 15. Organization #3: Justin Eastman 15 Syncsort Confidential and Proprietary - do not copy or distribute Justin Eastman, Senior Engineer
  • 16. USE CASE: THE NEED/PROBLEM Security threats on the mainframe due to lack of visibility. Highly sensitive PHI (Protected Health Information) escaping as data was moved from the production to test environment despite having fences and an automated scrubbing process. Security information and event management (SIEM) solution required. 16 Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Do nothing and wait for an audit, or even worse, a security exposure. Attempt to perform post-exposure forensics. Manually extract and process logs, SMF records, etc. and produce audit reports to demonstrate compliance. Do solution vendor search and utilize Gartner Magic Quadrant, etc. for enterprise-class SIEM. 17 Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. USE CASE: SOLUTION AND RESULTS SIEM Solution (Gartner SIEM Leader Splunk®) BIBD Solution to access z/OS log data in Splunk® for real-time alerts (Splunk’s chosen mainframe partner Ironstream) Combined solution for mainframe logs provides fast access to:  Unusual data movements, amount of movements, and protocols being used  How much of the data movement is compliant, non-compliant, or unknown  Sources of inbound traffic relating to any anomalies 18 Syncsort Confidential and Proprietary - do not copy or distribute Organizational confidence in ability to audit data access compliance!
  • 19. Big Iron to Big Data Poll Syncsort Confidential and Proprietary - do not copy or distribute 19 Q2. Is Mainframe “log” data going into your big data platform/repository? o Yes, it is being streamed into it today o Yes, it goes into it via periodic batch/other input method o No, but that data has been requested/is desired o No o Don’t Know
  • 20. Organization #4: David Friedman 20 Syncsort Confidential and Proprietary - do not copy or distribute David Friedman, Senior Systems Engineer Reminder: Type in your questions at any time during the presentation using the chat window. We will answer them during our Q&A session following the presentations or afterward.
  • 21. USE CASE: THE NEED/PROBLEM 21 Syncsort Confidential and Proprietary - do not copy or distribute Disbursed transaction information systems. Current tools provide partial solutions. Require comprehensive analytics across operation. Enterprise IT Operational Analytics (ITOA) dashboard desired.
  • 22. USE CASE ALTERNATIVES: IN-HOUSE, OTHER Organization selected Splunk® Enterprise as their ITOA solution for distributed computing environment. Considered Syncsort to access mainframe logs and get comparable data from mainframe systems. Conducted thorough POC of Ironstream in conjunction with Splunk® After POC, they were able to quickly start deploying it as a comprehensive monitoring solution. 22 Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. USE CASE: SOLUTION AND RESULTS Complete picture of overall system health. Meaningful correlation of information from disparate sources for faster triage and shorter MTTR. Company now able to monitor entire IT infrastructure to detect potential issues before they become critical. 23 Syncsort Confidential and Proprietary - do not copy or distribute Reduce MTTR
  • 24. Big Iron, Big Data and Big Iron to Big Data: Additional Use Cases? 24 Syncsort Confidential and Proprietary - do not copy or distribute 24 Syncsort Confidential and Proprietary - do not copy or distribute Security & Compliance (SIEM) • Access Control • Data Movement • Real-time Intrusion Detection • Others? IT Operations (ITOA) • Systems Performance and Tuning • Capacity Planning • Others? IT Service Intelligence? Other Monitoring & Analytics?
  • 25. Big Iron MVPs: Always Important, Big Iron and Big Data Functions, Staff Now Critical 25Syncsort Confidential and Proprietary - do not copy or distribute “BMC Annual Mainframe Research Results 2015”1 Big Iron to Big Data Big Data
  • 26. Syncsort Solutions for New and “Old” Requirements 26Syncsort Confidential and Proprietary - do not copy or distribute High-performance sort for z/OS® Best Sort for z Systems Offload Copy & SMS Compression and Sort work to zIIP processors Savings with zIIP Database Optimization Suites for IBM DB2® and CA IDMS™ Network Management z/OS® network management & security components Big Data integration with market- leading support for integration and access of mainframe and legacy data sources Data Access for Big Data Collect, transform and stream mainframe app and system log data in near real time to Splunk Enterprise Log Data Access for Big Data High-performance Big Data integration software – Linux/Unix/Windows; Hadoop & Spark; on premise and in the cloud Big Data Integration The most advanced sort features for Unix, Linux, and Windows platforms Best Sort for Distributed Platforms Faster application modernization with less hardware AppMod Big Iron Big Iron to Big Data Big Data Data Funnel Populate enterprise data lake at the push of a button Transparently migrate IMS to DB2 IMS and VSAM  DB2 Migration Powerful new tools for your databases
  • 27. Questions and More Information Additional Questions for David and Justin? For More Information: syncsort.com/ironstream blog.syncsort.com/ Try Ironstream for Free: syncsort.com/ironstreamstarteredition Comments/Other: Steven Menges: smenges@syncsort.com 27 Syncsort Confidential and Proprietary - do not copy or distribute