Security Information & Event Management Blog | SIEM

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Mainframe Security Part 2: User Authentication

How can a system accurately determine whether access to data should be allowed when it is not certain who the user is? We have seen this in the NSA -.

Read more

6 Log Management Questions to Ask this Holiday Shopping Season

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The.

Read more
1
Page 1 of 1