Big Iron to : Do more with the data you’ve got

Kevin Markwick Regional Sales Director Leading the next technology [r]evolution: Big Iron to Big Data

Big Iron to Big Data: a fast-growing market segment composed of solutions that optimize traditional data systems and deliver mission-critical data from these systems to next-generation analytic environments.

Syncsort Confidential and Proprietary - do not copy or distribute 2 Trusted Industry Leadership

>6,000 84 Customers of Fortune 100 are Customers

The global leader in Big Iron to Big Data 500+ 1968 3x Experienced & Talented 50 Years of Market Leadership Revenue Growth Data Professionals & Award-Winning Customer Support In Last 12 Months

Syncsort Confidential and Proprietary - do not copy or distribute 3 Macro Trends Require Big Iron to Big Data Strategies

Big Iron to Big Data

Digital business is driving Innovation is enabling significant growth in workloads analysis of larger, more managed by legacy data systems diverse data

▪ IBM i and Mainframes run the core ▪ Enterprises making major investments transactional applications of most in new Big Data repositories for enterprises greater insights ▪ Growing touchpoints on mobile & ▪ Mobile & online data sources must be online increasing transaction volumes analyzed quickly & efficiently and workload unpredictability ▪ Next-gen analytic environments must ▪ Critical focus on data infrastructure contain valuable app & machine data optimization & availability initiatives to from legacy systems that is liberated, meet demand and manage costs integrated & trusted

Syncsort Confidential and Proprietary - do not copy or distribute 4 Big Iron to Big Data Market Size and Forecast

Big Iron Big Data $20.4 billion large, stable $8 billion ~20% annual Data Infrastructure growth Optimization & Availability Big Data software market software Big Iron to Big Data market

$1.2 billion ~25% annual growth Big Iron to Big Data software market source: Estimates based on 2016 Wikibon study

Syncsort Confidential and Proprietary - do not copy or distribute 5 And These Strategies Must Drive Value Across Multiple Domains

Big Iron to Big Data

Data Infrastructure Data Liberation, Optimization & Availability Integration & Integrity

▪ Reduce computing costs on legacy ▪ Unlock mainframe and IBM i data for data systems including mainframes and advanced analytics & IBM i Power Systems ▪ Access, transform, integrate & deliver ▪ Improve availability, reliability and data to analytic environments integrity ▪ Ensure data quality, lineage, security ▪ Meet growing security and ▪ Enable data consumption on premise compliance requirements and in the cloud

Syncsort Confidential and Proprietary - do not copy or distribute 6 Customer Use Cases & Strategic Partnerships

Data Infrastructure Optimization Data Availability

• Mainframe Optimization • High Availability & Disaster Recovery • Cross-Platform Capacity Management • Mission-Critical Migration • EDW Optimization • Cross-Platform Data Sharing • Application Modernization • IBM i Data Security & Audit

Big Iron to Big Data A fast-growing market segment composed of solutions that optimize traditional data systems and deliver mission-critical data from these systems to next-generation analytic environments.

Syncsort Confidential and Proprietary - do not copy or distribute 7 Customer Use Cases & Strategic Partnerships

Data Integration Data Quality

• Mainframe Access & Integration for Machine Data • Data Governance • Mainframe Access & Integration for App Data • Customer 360 • High-performance ETL • Big Data Quality & Integration • Data Enrichment & Validation

Big Iron to Big Data A fast-growing market segment composed of solutions that optimize traditional data systems and deliver mission-critical data from these systems to next-generation analytic environments.

Syncsort Confidential and Proprietary - do not copy or distribute 8 Customer Use Cases & Strategic Partnerships

Data Data Data Data Infrastructure Optimization Availability Integration Quality

• Mainframe Optimization • High Availability & Disaster • Mainframe Access & • Data Governance • Cross-Platform Capacity Recovery Integration for Machine Data • Customer 360 Management • Mission-Critical Migration • Mainframe Access & • Big Data Quality & Integration • EDW Optimization • Cross-Platform Data Sharing Integration for App Data • Data Enrichment & Validation • Application Modernization • IBM i Data Security & Audit • High-performance ETL

Big Iron to Big Data A fast-growing market segment composed of solutions that optimize traditional data systems and deliver mission-critical data from these systems to next-generation analytic environments.

Syncsort Confidential and Proprietary - do not copy or distribute 9 Differentiated Product Portfolio & Technical Expertise

Data Data Data Data Infrastructure Optimization Availability Integration Quality

Best-in-class resource utilization Industry-leading mainframe #1 in high availability for Market-leading and performance, on premise data access and highest IBM i and AIX Power Systems data quality capability or in the cloud performing ETL

• MFX® for z/OS • DL/2 • MIMIX Availability & DR • Ironstream® • Trillium Software System • ZPSaver Suite • Zen Suite • MIMIX Move • Ironstream® Transaction • Trillium Quality for Big • EZ-DB2 • athene® • MIMIX Share Tracing Data • EZ-IDMS • athene • iTera Availability • DMX & DMX-h • Trillium Precise • DMX & DMX-h SaaS® • Enforcive IBM i Security • DMX Change Data Capture • Trillium Cloud • DMX AppMod • Trillium Global Locator

Big Iron to Big Data A fast-growing market segment composed of solutions that optimize traditional data systems and deliver mission-critical data from these systems to next-generation analytic environments.

Syncsort Confidential and Proprietary - do not copy or distribute 10 Delivering Business Value: Data Infrastructure Optimization

USE CASE CHALLENGES DESCRIPTION & BUSINESS VALUE CUSTOMERS

• Contain hardware and • Best-in-class solutions for optimizing mainframe performance and Mainframe software costs resource utilization • Improve performance • Dramatically reduce the costs by reducing billable CPU time, Optimization • Meet/exceed SLAs to containing overall software costs and delaying hardware upgrades support the business • Meet SLAs/batch windows to better serve the business • Capacity, performance • Single solution to proactively manage capacity across your enterprise Cross-Platform incidents impact business IT services and infrastructure Capacity • Difficult to get single view • Avoid service disruptions Management across enterprise • Predict and minimize IT infrastructure costs • Lack of time/resources • Free up staff, maximize accuracy • EDW costs are escalating, • Solutions to shift data and ELT workloads to the data lake quickly and performance suffering due efficiently EDW to ELT/ETL processing • Lower EDW costs and improve performance for Business Intelligence Optimization • Moving data and • Increase productivity and get faster time to value by automating, processing to data lake is optimizing and future-proofing development without requiring complex, takes a long time special skills • Minimize risk • Enables migration of applications off the mainframe, with minimum • Match performance of or no modifications, to run on other platforms with the same or Application application on new system faster performance Modernization • Lack of skills/resources • Seamless integration with leading re-hosting solutions • Time to value • No manual coding or mainframe expertise required

Syncsort Confidential and Proprietary - do not copy or distribute 11 Delivering Business Value: Data Availability

USE CASE CHALLENGES DESCRIPTION & BUSINESS VALUE CUSTOMERS

• Minimize risk and costs of • Proven IBM i solution virtually eliminates downtime and data loss for High Availability downtime businesses of all sizes, from SMB to enterprise & Disaster • Meet SLA, compliance • Reduce risk and costs of planned administrative downtime, Recovery requirements component failures, software defects, operator error, malicious users, • Resource constraints and local/regional disaster

• • Complexity, downtime and Near-zero downtime workload and system migration Mission-Critical • risk of migrations Mitigate risk • Migration • SLAs, compliance Ease strain on internal IT resources

• Data spread across systems • Real-time data sharing between all leading databases, operating leads to stale, incomplete systems, platforms (physical, virtual, cloud) Cross-Platform information • Improve decision-making, business productivity with accurate, up-to- Data Sharing • Traditional approaches of date information data movement are • Easy to use – automated, no programming required inefficient, costly • Cost effective

• IBM i has no comprehensive • Most comprehensive, easy-to-use security & compliance solution for security management IBM i IBM i Data • Risk to your business • Get complete oversight/control of IBM i security without special skills Security & Audit • Compliance, governance • Protect critical data from ever-changing threats – external and internal • Lack of IBM i visibility/skills • Satisfy auditors and meet the strictest compliance regulations

Syncsort Confidential and Proprietary - do not copy or distribute 12 Delivering Business Value: Data Integration

USE CASE CHALLENGES DESCRIPTION & BUSINESS VALUE CUSTOMERS

Mainframe • Mainframe data left out of • Collect, transform and forward mainframe operational and security Access & enterprise-wide views data into analytics platforms like Splunk Enterprise • Data is diverse, complex • Include mainframe with your other systems for 360-degree view of Integration for • Skills, expertise shortages your enterprise Machine Data • Easy to use - no mainframe expertise required • Critical enterprise data • Unparalleled technology and expertise for loading Mainframe data Mainframe trapped in Mainframe silo – into the data lake and integrating it with MapReduce or Spark Access & missing from data lake • Deliver powerful new insights by combining mainframe data with Integration for • Mainframe is expensive other data sources Application • Working with Mainframe • Save on Mainframe storage and processing costs Data and Big Data requires hard- • Achieve faster time to value to-find skills • Use skills you already have - no mainframe expertise required • Manual coding is resource- • Fast, efficient, simple no-code ETL solution that runs on any platform intensive, slow, inflexible – including MapReduce and Spark – on premise or in the cloud and difficult to maintain • Get business insights faster with up to 10x lower elapsed processing High • Data Integration software times, linear scalability Performance requires tuning for • Shift staff to higher-value initiatives ETL performance/efficiency • Future-proof your environment • ETL jobs must be rewritten • Save money by optimizing your system resources for new execution frameworks

Syncsort Confidential and Proprietary - do not copy or distribute 13 Delivering Business Value: Data Quality

USE CASE CHALLENGES DESCRIPTION & BUSINESS VALUE CUSTOMERS

• Regulatory compliance, • Data profiling integrated with leading data governance and data mitigate risk lineage solutions to identify/assess data across your organization and Data • Data volume/complexity determine compliance with business rules – on premise or in the cloud Governance • Lack of visibility, • Identify data issues fast so you can fix them and stay compliant accessibility, trust in the • Have confidence in your data data • Empower users with collaborative, web-based tools • Grow customer base, share • Data profiling, quality and enrichment solutions deliver a common, of wallet, loyalty unified, trusted view of your customer data, across all systems and Customer 360 • Increasing volume, sources – on premise or in the cloud complexity and sources of • Maximize the value, efficiency and integrity of every customer customer data interaction, across the entire customer lifecycle • Maximize the value/ROI of • Highly-scalable, enterprise-level data quality that supports Big Data Big Data Quality the data lake frameworks like MapReduce and Spark to process the largest and most • Ensure the data lake is complex data volumes in the data lake – on premise or in the cloud Leading U.K. & Integration trusted source of data • Trusted the insights from your most critical data assets Bank • Achieve fast time to value with flexible deployment and ease of use • Need complete, accurate • Real-time data enrichment, validation and verification of third-party data for effective customer data sources, including email, landline/mobile phone, postal address Data Enrichment engagement and internet connectivity & Validation • Customer data constantly • Engage with your customers and prospects more effectively changes • Mitigate risk by validating customer data

Syncsort Confidential and Proprietary - do not copy or distribute 14 DATA AVAILABILITY….AND MORE Market Landscape and Key Concepts: IBM i Data

Having The Big Picture allows organizations analyze these data sets to proactively and reactively mitigate different risks. Typical reasons to perform data analysis include; compliance with security policies and/or regulations, oversight of IT operations, and system troubleshooting.

Security Journal (QAUDJRN) QHIST Log IBM i File Journals Message Queue Data NEW: Operational Data Cross- Syslog SPLU Platform IFS Files /SIEM Audit Exit Point Traffic* NK

Encryption* Strea

•View DataView Data* SQL Audit* m Data Export Output Types

Key Differentiators: Robust Filtering, Batch or Real-Time, Performance Optimized *Requires use of our security products Market Landscape and Key Concepts: Splunk

High-Level Summary of Splunk • First machine data analysis software • Market leader • The “ for log files” enterprise tool • Can be expensive – particularly with growing data volumes • Original target for our Ironstream® products • More mature partnership Market Landscape and Key Concepts: SIEM

• SIM: Log management, analytics, compliance reporting • SEM: Real-time monitoring & incident management • Advanced Threat Detection • Basic security monitoring Security Information & Event Management • Investigation and incident response Market Landscape and Key Concepts: SIEM & Big Data

Data Type Use Case Main Players Data Size

API for Other Data OS logs can be Splunk, Elastic Even Bigger Data Sources correlated against Stack, application activity

Operations Data Security data & Splunk ITSI, Elastic Big Data operations data Stack, Sumo Logic, converge Logpoint, QRadar, LogRhythm SIEM Data Security threat QRadar, Splunk ES, Little Data detection, monitoring LogRhythm, & response ArcSight, AlienVault

SPLUNK Market Landscape and Key Concepts: Stream Your Big Iron Data into The Industry-Leading Platform For Machine Data

We make Critical IBM i and Mainframe Machine Data USEABLE in Splunk with Ironstream®

Machine Data: Any Location, Type, Volume Answer Any Question

Online Services Ad hoc Monitor Report & Custom On- Web Developer Premises Services search & alert analyze dashboards Platform

Security Servers GPS Location Packaged Networks Applications

Desktops Private Storage IBM i Messaging Custom Cloud Apps RFID Telecoms Online Energy Shopping Meters Platform Support (Apps / API / SDKs) Cart Databases Mainframe Call Detail Web Records Enterprise Scalability Public Clickstreams Cloud Smartphones Universal Indexing and Devices What Can You Do with Security Analytics Using IBM i Data?

Detect Data Movements – Inbound/Outbound FTP Dataset access operations – Determine potential security threats based on unauthorized access attempts – Ensure only authorized users are accessing critical datasets Privileged/non-privileged User Activity Monitoring – Unusual behavior pattern – off hours connections – High number of invalid logon attempts Attack Detection – Intrusion, Scans, Floods Authentication Anomalies – Entered the building at 08:30 but logged on from another country at 09:00 Maintain Compliance – SOX, HIPAA, PCI, GDPR, Etc. Key Use Cases – Problems we Solve

Enterprise Security and Compliance/SIEM – Detect and prevent security threats – Ensure compliance – Ensure audits pass IT Operations Analytics/ITOA/Service Intelligence – Bigger picture of what's happening in the environment – Make better decisions to take control of the IT infrastructure – Ensure SLAs Met What Can You Do with Security Analytics Using IBM i Data?

Detect Data Movements – Inbound/Outbound FTP Dataset access operations – Determine potential security threats based on unauthorized access attempts – Ensure only authorized users are accessing critical datasets Privileged/non-privileged User Activity Monitoring – Unusual behavior pattern – off hours connections – High number of invalid logon attempts Attack Detection – Intrusion, Scans, Floods Authentication Anomalies – Entered the building at 08:30 but logged on from another country at 09:00 Maintain Compliance – SOX, HIPAA, PCI, GDPR, Etc. Hadoop | The New Centerpiece of the Modern Data Architecture What do customers want to use their Hadoop clusters for?

1. ETL 2. Analytics* 3. Data Blending 4. Active Archive 5. EDW / Mainframe Optimization What do customers get out of it? – Business Benefits

Increase Productivity Increase Revenue Get More for EDW/ Reduce Costs and Growth Mainframe Investment Next-Gen Analytics Archive Data Retain Data for Increase Agility Compliance Free Mainframe Resources Implementation Challenges

Big Data Challenges 50 40 30 20 10 0 % of People Who Consider this a Top Challenge (Rated 1 or 2)

Data Quality Skills Governance Rapid Change CDC Mainframe Data Movement Cost

1. Data Quality: Assessing and improving quality of data as it enters and/or in the data lake. 2. Skills/Staff: Need to learn a new set of skills, Hadoop programmers are difficult to find and/or expensive. 3. Data Governance: Including data lake in governance initiatives and meeting regulatory compliance. 4. Rapid Change: Frameworks and tools evolve fast, and it’s difficult to keep up with the latest tech. 5. Fresh Data (CDC): Difficult to keep data lake up-to-date with changes made on other platforms. 6. Mainframe: Difficult to move mainframe data in and out of Hadoop/Spark. 7. Data Movement: Difficult to move data in and out of Hadoop/Spark. Key Concepts: Security and Compliance in IBM i Environments

The IBM i is not inherently a secure system, it is however, extremely securable

Being in compliance doesn’t automatically mean the system is secure

Segregation of duties – Auditors tend not to approve of tools developed in-house or modules that are part of an ERP Key Concepts: Security and Compliance in IBM i Environments

New/open-source protocols create access headaches – Legacy, proprietary protocols and experienced administrators now cohabitate with new/open-source protocols and young techies. All of the access points need to be controlled.

The IBM i is now more exposed to the worldwide hacker community (they finally discovered that it’s a very valuable target) – First session dedicated to IBM i was presented at Def Con in 2015 Most customers have a security program in place and claim to be confident in it

How secure are your organization’s IT Do you have a formal security How confident are you in the systems today compared to a year program in place for IT systems? effectiveness of your ago? organization’s security program?

My organization’s IT systems are Yes Very confident less secure My organization’s IT systems are Somewhat confident about as secure as they were last year No Neither confident nor unconfident My organization’s IT systems are more secure Somewhat unconfident Don't know Don’t know Very unconfident

0% 10% 20% 30% 40% 50% 60% 0% 10% 20% 30% 40% 50% 60% 70% 80% 0% 10% 20% 30% 40% 50%

Customers are much more involved in, and knowledgeable about, security than in the recent past, which should send a clear message to security software vendors: “We aren’t neophytes so don’t waste our time explaining things we already know, get directly to the point about how you can solve my problems”

From Vision’s 2017 Security Survey - IBM Power Compliance is a primary driver of IT security

What resources and information were used to define your organization’s security program? • It is rare to find a company today that doesn’t need to Compliance needs comply with a regulation Industry best practices or external audit

Results of security audit requirement

Risk-based framework • Countries in secondary

Cost-value analysis markets have their own regulations (Angola, Experience from past attacks Lebanon, Colombia, etc…) Board recommendations or are in the process to Don’t know bringing them online Other (please specify) (China) From Vision’s 2017 Security Survey - IBM Power 0% 10% 20% 30% 40% 50% 60% 70% 80% What IBM i security software is already implemented?

45% of respondents have not Security Solutions

implemented security software We have not deployed security… and 12% don’t know if they have Other (please specify) (yellow highlight) I don't know Secure Sphere Imperva 40% have implemented a Help Cosyn Software Systems security product (in red) Raz-Lee iSecurity suite of products IBM Power SC 4.5% have implemented Enforcive Cilasoft Suite of products and 1.7% Cilasoft Help Systems Safestone tools Linoma Crypto Complete Numbers are likely biased toward Help Systems CCSS tools North America so would likely be NetIQ Secure Configuration… different in other geographies Help Systems SkyView tools Enforcive Enterprise Security Townsend Software Help Systems Bytware tools Help Systems Powertech tools 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

From Vision’s Risk Management Survey – IBM i, Dec. 2016 – respondents are Vision customers Finding Opportunities with the Security Risk Assessment Tool

What it Is: – Free, self-service assessment tool that enables IBM i administrators and security officers to identify security vulnerabilities by conducting real-time, fully controlled penetration attempts on their IBM i environment. – Customer receives an Executive Summary of the results, along with specific recommendations for remediation. – Customer registers for access on our website, downloads the tool, installs the software. Assessment runs as a native job on the target computer. It´s all about Data replication

Todays market

Storage Replication Software Replication • Easy to use • Near ´Zero´downtime • Pushed by IBM/partners • Continous Data Protection • Optimum in RPO and RTO

The Game-changer

Mimix for FlashCopy • Hybrid solution • Different Data with indivdual The Idea RPO/RTO requirements • Opens the market of storage replication that was mostly inaccessible • Win net new logos • Provides a new opportunity to return to customers we lost to SAN replication

The Channel • Opens a whole new channel of partners focused on SAN storage • Vision direct customers with storage replication in partnership with sophisticated partner IBM FlashCopy Challenges

File1 File2 Switched off IPL phase Certain File 3 Flash-suspend Application down Compromise tr2 t QUIESCE File FORCE WRITE DATA 1 Uncertain File 2 Just FlashCopy t r1 File 3 t r Rollback Flash-none suspend 3 FlashCopy Consistency FlashCopy Commit & Rollback

Tue Tue Tue 06:00am 12:00pm 06:00pm LIVE

RCV0001 RCV0001 RCV0001 RCV0002

Flash1

t1 t2 t3 t4

Flash2 RCV0001 RCV0002

Flash3 FlashCopy Journal Chain FlashCopy Timeline