SlideShare a Scribd company logo
1 of 30
How Security and
HA Need to Work
Together
Bill Peedle | Principal Sales Engineer
Barry Kirksey | Principal Sales Engineer
Today’s Topics
• IBM i is mission critical
• HA and Security coordination
• Security
• Switching
• Replication
• Reporting and monitoring
• Minimizing downtime
2
IBM i is Mission Critical
Let’s talk about IBM Power Systems running IBM i
4
Reputation
• IBM i has been a strategic
platform for decades
• IBM i has been able to
adapt to a changing IT
landscape
• IBM i handles important,
mission-critical workloads
• Popular in manufacturing,
retail, distribution, logistics,
banking, healthcare,
insurance, hospitality
management, government
management, and legal
case management.
Trends Concerns
• Increasing move to cloud
deployment
• Existing customers
continue to upgrade
systems and OS versions
• Customers continue to
add more partitions -50%
of companies have more
than 3 LPARs
• Remote work
environments continue to
grow
• Security knowledge and
skills gap
• Security continues to be
top priority
• HA/DR cited as top
concern for almost 2/3
of customers
• Finding required staff
with IBM i skills also a
top concern
• Automation and
modernization are
frequently cited
concerns
*Forta 2022 IBM i Marketplace Survey
IT Jungle
2023 IBM i
Marketplace
Predictions*
Automation Modernization
Automation is key in operations, job
scheduling and regular complex
and simple tasks, but the resources
for skilled IBM Power Systems
people are scarce and becoming
even scarcer
IBM i is the system of record and
clients are implementing a hybrid
approach to modernization
Spending Cloud
Many IT projects will be looking to
optimize costs. We will see
investment in tools on the platform
(IBM i) to help move workloads to
cloud/hybrid cloud environments
2023 will mark a year where
customers finally make the move to
cloud-based hosting of their IBM i
5 * IT Jungle-2023 IBM i Predictions, Part 1 - 1/16/2023
IBM i marketplace surveys
• Virtually all surveys continue to point to Security
as Number 1 concern
• HA is usually 2nd or 3rd and is generally cited by
more than 50% of survey respondents
• Only 5% of IBM i users intend to remove all
IBM i-based applications from their systems
during the next two years
• Downtime costs IBM i uses an average of $125k
per event**
• Remote operations has become the new
normal for most organizations causing
increased security risks**
• 70% of respondents using their IBM i platform
to run more than half of core business
applications.
6 **Forrester Economic Impact Study
Tension Between Availability
and Security
7
Conflict
• Operations team generally focused on Availability
• Security team focused on locking down a secure environment
Causes
• Conflicting Values
• Complexity
• Policy problems
• Communication & coordination
How to coordinate
IBM i Security and
High Availability
Replication Topics to discuss
• IBM i Security Product Modules required to be replicated
• Switching considerations for HA and Security
• Availability and security in a Cloud environment
• Streaming HA and security data to IT Operations
Analytics (ITOA) solutions
• Managing risk and downtime for encryption of data at rest,
while maintaining switch readiness
9
Security Modules
Multi-factor Authentication (MFA)
Security Module Replication
11
• Enabling Multi-factor Authentication
• Install MFA Product on target server
• Configure IBM i replication product to replicate MFA
• Authentication server considerations
• External
• Local
• HA Server access when in read only mode
Encryption Security Module Replication
12
• Enabling Encryption
• Install on target server
• Configure IBM i replication product to replicate the encryption module
• Encryption at the filed level with IBM i Field Procedures
• Fields encrypted/decrypted on the fly
• Field Proc procedure used on the fly
• Procedures must be replicated
Exit Point Security
Module Replication
Managing Exit Points
• Install on target server
• Configure IBM i replication product to
replicate the exit point software product
• Exit Points must be turned on at the system
level
• Consideration for new exit points on source
need to be introduced to backup server
13
Switching Considerations
Switching Your HA and Security Products
15
• Products need to be integrated
• Procedure and steps needed to accommodate
integrated switching
• Automated notification of manual steps required
• Regular testing to ensure HA and Security switch error
free
New
LPARs
Current
LPARs
From
Anywhere
To
Anywhere
Any
Hardware
Any
Storage
Physical,
Virtual, Cloud
Any
IBM i OS
Version
Replication in the Cloud
Presentation name
17
Cloud Considerations
HA and security products
need to be Cloud ready
Many Cloud environments
do not have tape access
Reporting and Monitoring
HA and Security Data
Some definitions…
19
• Security Information and Event Management (SIEM) - offers real-time monitoring and
analysis of events as well as tracking and logging of security data for compliance or auditing
purposes
• IT Operations Analytics (ITOA) - IT operations analytics involves collecting IT data from
different sources, examining that data in a broader context, and proactively identifying
problems in advance of their occurrence.
• IT Operations Management (ITOM) - IT operations management (ITOM) is responsible for
managing information technology requirements within an organization, overseeing the
provisioning, capacity, performance, and availability of IT infrastructure and resources.
Leading IT analytics & security platforms lack
native IBM i support
20
Distributed and
Cloud environments
IBM i Systems
Online
services
Storage
Online
Shopping
Cart
Servers
Desktops
Web
clickstreams
Security
Networks
Telecoms
Call detail
records
GPS
location
Messaging
Databases
RFID
Web
services
Packaged
applications
APP
Custom
apps
Energy
meters
Smartphones
and devices
On-
premises
Private
cloud
Public
cloud
IBM i
IT operations analytics
Monitor the business for real-time
operational intelligence
• Monitor operational status of enterprise IT
infrastructure
• Monitor resource utilization and availability
• Realtime visibility into IBM systems
• Predict and avoid problems
• Non-IBM users have access to IBM KPIs
21
Security monitoring
Extend your security strategy to include
the IBM i
• Detect and prevent security threats
• Report on security events
• Prioritize on highest impact issues
• Monitor privileged user activity
• Automated reporting and simplified
compliance
22
Minimizing IBM i Downtime
while Encrypting Data
Implementing
encryption has
its challenges
Exclusive Locks Small Window
• IBM i Field Procedures (FieldProc)
needs an Exclusive Lock on file
data to add/remove an
encryption program and
encrypt/decrypt a column
• Your maintenance window may
be too small to encrypt/decrypt
all files during the allotted time
Application Risk
• Encryption processing changes
every record within a file –
increasing risk to applications
24
Encrypt While
Active is useful
throughout the
lifetime of your
encryption
project
Initial Encryption Removing Encryption
• Adding encryption to fields/files
not currently encrypted
• Removing encryption from
fields/files currently encrypted
Key Rotation
• Cycling an encrypted file from
one set of encryption keys to
another
(annually or on another regular interval to meet
compliance requirements)
25
Benefits of Encrypt
While Active
• Minimizes downtime for encryption
operations
• Mitigates the risk of application failure
after encryption
• Ensures HA/DR-readiness throughout
the encryption process
26
As an added benefit, deleted records can be
removed from the file during the encryption –
a Compress While Active service
How Precisely
can help
Precisely IBM i Products
• Protects against downtime
and meets aggressive service
level agreements
• Flexible, scalable replication
and failover automation
• Scales from SMB to
enterprise workloads
• Minimizes impact on network
bandwidth and CPU usage
• Supports mixed i OS and
hardware environments on
physical, virtual and cloud
platforms
Integrates log data from IBM i into
IT operations analytics and
management platforms
• Robust, multi-layered, and
resilient defenses against
advanced malware threats
• Enforces strict security policies to
protect your systems with
automated access control
• Generates generate clear,
actionable alerts and reports
• Protects sensitive and highly
regulated data from
unauthorized access using
encryption, tokenization and
masking technologies
• Provides access to the log data
to address IT operations
analysis, security, and
compliance
• Unlocks real time operational
intelligence from IBM i systems,
• Improves access to data by
breaking down silos
• Increases value and
observability of IT services &
operations
28
Ironstream
Assure HA Assure Security
Protects IBM i systems and data
from security breaches and assures
regulatory compliance
Protect IBM i servers from
downtime and data loss
Questions
IBM i HA and Security: Why They Need to Work Together

More Related Content

Similar to IBM i HA and Security: Why They Need to Work Together

1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptxnguyenthanhdatpl403
 
Modern Infrastructure - Mace
Modern Infrastructure - Mace Modern Infrastructure - Mace
Modern Infrastructure - Mace Prolifics
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Precisely
 
Utilizing Mainframe Machine Data in Security Operations
Utilizing Mainframe Machine Data in Security OperationsUtilizing Mainframe Machine Data in Security Operations
Utilizing Mainframe Machine Data in Security OperationsPrecisely
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aTony Pearson
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®Precisely
 
Enhance ServiceNow with Automated Discovery for Mainframe and IBM i
Enhance ServiceNow with Automated Discovery for Mainframe and IBM iEnhance ServiceNow with Automated Discovery for Mainframe and IBM i
Enhance ServiceNow with Automated Discovery for Mainframe and IBM iPrecisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at AirbusSplunk
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor NeutralityVandana Verma
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Securitylawmoore
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 

Similar to IBM i HA and Security: Why They Need to Work Together (20)

1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx
 
Modern Infrastructure - Mace
Modern Infrastructure - Mace Modern Infrastructure - Mace
Modern Infrastructure - Mace
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 
Utilizing Mainframe Machine Data in Security Operations
Utilizing Mainframe Machine Data in Security OperationsUtilizing Mainframe Machine Data in Security Operations
Utilizing Mainframe Machine Data in Security Operations
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®
Top Use Cases for Mainframe and IBM i Discovery in ServiceNow®
 
Enhance ServiceNow with Automated Discovery for Mainframe and IBM i
Enhance ServiceNow with Automated Discovery for Mainframe and IBM iEnhance ServiceNow with Automated Discovery for Mainframe and IBM i
Enhance ServiceNow with Automated Discovery for Mainframe and IBM i
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at Airbus
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 

More from Precisely

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPrecisely
 

More from Precisely (20)

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

IBM i HA and Security: Why They Need to Work Together

  • 1. How Security and HA Need to Work Together Bill Peedle | Principal Sales Engineer Barry Kirksey | Principal Sales Engineer
  • 2. Today’s Topics • IBM i is mission critical • HA and Security coordination • Security • Switching • Replication • Reporting and monitoring • Minimizing downtime 2
  • 3. IBM i is Mission Critical
  • 4. Let’s talk about IBM Power Systems running IBM i 4 Reputation • IBM i has been a strategic platform for decades • IBM i has been able to adapt to a changing IT landscape • IBM i handles important, mission-critical workloads • Popular in manufacturing, retail, distribution, logistics, banking, healthcare, insurance, hospitality management, government management, and legal case management. Trends Concerns • Increasing move to cloud deployment • Existing customers continue to upgrade systems and OS versions • Customers continue to add more partitions -50% of companies have more than 3 LPARs • Remote work environments continue to grow • Security knowledge and skills gap • Security continues to be top priority • HA/DR cited as top concern for almost 2/3 of customers • Finding required staff with IBM i skills also a top concern • Automation and modernization are frequently cited concerns *Forta 2022 IBM i Marketplace Survey
  • 5. IT Jungle 2023 IBM i Marketplace Predictions* Automation Modernization Automation is key in operations, job scheduling and regular complex and simple tasks, but the resources for skilled IBM Power Systems people are scarce and becoming even scarcer IBM i is the system of record and clients are implementing a hybrid approach to modernization Spending Cloud Many IT projects will be looking to optimize costs. We will see investment in tools on the platform (IBM i) to help move workloads to cloud/hybrid cloud environments 2023 will mark a year where customers finally make the move to cloud-based hosting of their IBM i 5 * IT Jungle-2023 IBM i Predictions, Part 1 - 1/16/2023
  • 6. IBM i marketplace surveys • Virtually all surveys continue to point to Security as Number 1 concern • HA is usually 2nd or 3rd and is generally cited by more than 50% of survey respondents • Only 5% of IBM i users intend to remove all IBM i-based applications from their systems during the next two years • Downtime costs IBM i uses an average of $125k per event** • Remote operations has become the new normal for most organizations causing increased security risks** • 70% of respondents using their IBM i platform to run more than half of core business applications. 6 **Forrester Economic Impact Study
  • 7. Tension Between Availability and Security 7 Conflict • Operations team generally focused on Availability • Security team focused on locking down a secure environment Causes • Conflicting Values • Complexity • Policy problems • Communication & coordination
  • 8. How to coordinate IBM i Security and High Availability
  • 9. Replication Topics to discuss • IBM i Security Product Modules required to be replicated • Switching considerations for HA and Security • Availability and security in a Cloud environment • Streaming HA and security data to IT Operations Analytics (ITOA) solutions • Managing risk and downtime for encryption of data at rest, while maintaining switch readiness 9
  • 11. Multi-factor Authentication (MFA) Security Module Replication 11 • Enabling Multi-factor Authentication • Install MFA Product on target server • Configure IBM i replication product to replicate MFA • Authentication server considerations • External • Local • HA Server access when in read only mode
  • 12. Encryption Security Module Replication 12 • Enabling Encryption • Install on target server • Configure IBM i replication product to replicate the encryption module • Encryption at the filed level with IBM i Field Procedures • Fields encrypted/decrypted on the fly • Field Proc procedure used on the fly • Procedures must be replicated
  • 13. Exit Point Security Module Replication Managing Exit Points • Install on target server • Configure IBM i replication product to replicate the exit point software product • Exit Points must be turned on at the system level • Consideration for new exit points on source need to be introduced to backup server 13
  • 15. Switching Your HA and Security Products 15 • Products need to be integrated • Procedure and steps needed to accommodate integrated switching • Automated notification of manual steps required • Regular testing to ensure HA and Security switch error free New LPARs Current LPARs From Anywhere To Anywhere Any Hardware Any Storage Physical, Virtual, Cloud Any IBM i OS Version
  • 17. Presentation name 17 Cloud Considerations HA and security products need to be Cloud ready Many Cloud environments do not have tape access
  • 18. Reporting and Monitoring HA and Security Data
  • 19. Some definitions… 19 • Security Information and Event Management (SIEM) - offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes • IT Operations Analytics (ITOA) - IT operations analytics involves collecting IT data from different sources, examining that data in a broader context, and proactively identifying problems in advance of their occurrence. • IT Operations Management (ITOM) - IT operations management (ITOM) is responsible for managing information technology requirements within an organization, overseeing the provisioning, capacity, performance, and availability of IT infrastructure and resources.
  • 20. Leading IT analytics & security platforms lack native IBM i support 20 Distributed and Cloud environments IBM i Systems Online services Storage Online Shopping Cart Servers Desktops Web clickstreams Security Networks Telecoms Call detail records GPS location Messaging Databases RFID Web services Packaged applications APP Custom apps Energy meters Smartphones and devices On- premises Private cloud Public cloud IBM i
  • 21. IT operations analytics Monitor the business for real-time operational intelligence • Monitor operational status of enterprise IT infrastructure • Monitor resource utilization and availability • Realtime visibility into IBM systems • Predict and avoid problems • Non-IBM users have access to IBM KPIs 21
  • 22. Security monitoring Extend your security strategy to include the IBM i • Detect and prevent security threats • Report on security events • Prioritize on highest impact issues • Monitor privileged user activity • Automated reporting and simplified compliance 22
  • 23. Minimizing IBM i Downtime while Encrypting Data
  • 24. Implementing encryption has its challenges Exclusive Locks Small Window • IBM i Field Procedures (FieldProc) needs an Exclusive Lock on file data to add/remove an encryption program and encrypt/decrypt a column • Your maintenance window may be too small to encrypt/decrypt all files during the allotted time Application Risk • Encryption processing changes every record within a file – increasing risk to applications 24
  • 25. Encrypt While Active is useful throughout the lifetime of your encryption project Initial Encryption Removing Encryption • Adding encryption to fields/files not currently encrypted • Removing encryption from fields/files currently encrypted Key Rotation • Cycling an encrypted file from one set of encryption keys to another (annually or on another regular interval to meet compliance requirements) 25
  • 26. Benefits of Encrypt While Active • Minimizes downtime for encryption operations • Mitigates the risk of application failure after encryption • Ensures HA/DR-readiness throughout the encryption process 26 As an added benefit, deleted records can be removed from the file during the encryption – a Compress While Active service
  • 28. Precisely IBM i Products • Protects against downtime and meets aggressive service level agreements • Flexible, scalable replication and failover automation • Scales from SMB to enterprise workloads • Minimizes impact on network bandwidth and CPU usage • Supports mixed i OS and hardware environments on physical, virtual and cloud platforms Integrates log data from IBM i into IT operations analytics and management platforms • Robust, multi-layered, and resilient defenses against advanced malware threats • Enforces strict security policies to protect your systems with automated access control • Generates generate clear, actionable alerts and reports • Protects sensitive and highly regulated data from unauthorized access using encryption, tokenization and masking technologies • Provides access to the log data to address IT operations analysis, security, and compliance • Unlocks real time operational intelligence from IBM i systems, • Improves access to data by breaking down silos • Increases value and observability of IT services & operations 28 Ironstream Assure HA Assure Security Protects IBM i systems and data from security breaches and assures regulatory compliance Protect IBM i servers from downtime and data loss

Editor's Notes

  1. Conflicting values Because of the innate conflicting values between availability and security, there is also friction when choosing best practices to follow when teams are combined. For example, SecOps combines multiple teams with specific duties, goals, and responsibilities. There is no question that everyone wins when they can work together in balance, but their conflicting values make it especially difficult to agree on workflows and best practices. For example, when DevOps teams think about vulnerability patching, they think of it in terms of downtime and disruptions that cause problems and inconveniences for users. That’s why they often turn to regularly scheduled downtime in an attempt to prioritize security. However, maintenance windows and scheduled downtime can’t result in complete patching every time. Network updates are not released according to your organization’s timetable. And hackers certainly won’t wait until your next security update to launch an attack. Complexity Deciding on how often to patch and how quickly to respond when known vulnerabilities are released is just the beginning of the issues between availability and security. And sometimes, reducing risk is more complicated than running an update or patching a specific vulnerability. For example, some vulnerabilities occur at the programming language level. These vulnerabilities impact all of the apps written with the affected language. Sometimes operations and security teams are oblivious to the inner workings of certain programming languages. If they don’t know how to log in with Python, how will they patch a PHP vulnerability? This is where developers get involved, and DevSecOps teams are formed, further adding to the complexity of balancing availability and security. Not only must teams update the language version to patch the vulnerability, but they also must rewrite application code with the language-level changes in mind. At this level of complexity, developers have doubled their workload, IT teams cannot serve their primary functions, and security specialists are faced with hours of rework securing an entirely new application. Policy problems It is at this point that processes break down. Everything is on fire, no one is clear on how to proceed, and organizations often suffer from data incidents at this stage. In addition to a multi-layered conflict across the company, you also have to repair your reputation with customers. This is also where the idea of a top-to-bottom policy seems the best way to deal with the issues. And while policies can solve these problems to some degree, no team is truly happy with the outcome. The result? Mediocre products and services from a mediocre organization. Another problem with policies is that they often leave systems unpatched for long periods, giving hackers plenty of opportunities to sneak in and wait for the perfect time to launch an attack.