The Arcati Mainframe Yearbook 2020

The Arcati Mainframe Yearbook 2020

ArcatiArcati MainframeMainframe YearbookYearbook 20072020 Mainframe strategy The Arcati Mainframe Yearbook 2020 The independent annual guide for users of IBM mainframe systems SPONSORED BY: PUBLISHED BY: Arcati Limited 19 Ashbourne Way Thatcham Berks RG19 3SJ UK Phone: +44 (0) 7717 858284 Fax: +44 (0) 1635 881717 Web: http://www.arcati.com/ E-mail: [email protected] © Arcati Limited, 2020 1 Arcati Mainframe Yearbook 2020 Mainframe strategy Contents Welcome to the Arcati Mainframe Yearbook 2020 ............................................................ 3 10 Steps to True Mainframe DevOps: A Phased Approach to Cross-platform DevOps Success ................................................................................. 6 Mainframe Data Management .......................................................................................... 17 Join a Mainframe Development Revolution in 2020 – Embrace Open! ....................... 22 Indicators of Compromise and Why It Takes Six-Plus Months to ID a Breach ........... 27 Mainframe breaches: a beginner’s defensive strategy ................................................. 33 The 2020 Mainframe User Survey .................................................................................... 37 An analysis of the profile, plans, and priorities of mainframe users Vendor Directory ............................................................................................................... 55 Vendors, consultants, and service providers in the z/OS environment A guide to sources of information for IBM mainframers ............................................ 141 Information resources, publications, social media, and user groups for the z/OS environment Glossary of Terminology ................................................................................................ 147 Definitions of some mainframe-related terms Mainframe evolution ........................................................................................................ 179 Mainframe hardware timeline 1952-2019; mainframe operating system development SPONSORS Action Software 58, 59 Fujitsu 88. 88 BMC Software 27, 68 Key Resources 99, 100 Broadcom 22, 68 Model 9 17, 109 Compuware 6, 73 Software AG 123, 123 Data Kinetics 54, 77 Software Diversified Services 124, 125 ESAi 82, 82 Tone Software 131, 131 2 © Arcati Ltd, 2020 ArcatiArcati MainframeMainframe YearbookYearbook 20072020 Mainframe strategy Welcome to the Arcati Mainframe Yearbook 2020 We are very grateful – as always – to all those who have contributed this year by writing articles, taking part in our annual user survey, or updating their company profiles. In particular, I must thank the sponsors and advertisers, without whose support this Yearbook would not be possible. The big IBM announcement in 2019 was its new z15 mainframe, which culminates four years of development with over 3,000 IBM Z patents issued or in process and represents a collaboration with input from over 100 companies. Building on the z14’s pervasive encryption, IBM introduced Data Privacy Passports technology that can be used to gain control over how data is stored and shared. This gives users the ability to protect and provision data and revoke access to that data at any time. In addition, it not only works in the z15 environment, but also across an enterprise’s hybrid multi-cloud environment. This helps enterprises to secure their data wherever it travels. Also new with the z15 is IBM Z Instant Recovery, which uses z15 system recovery technologies, to limit the cost and impact of planned and unplanned downtime by accelerating the recovery of mission-critical applications by using full system capacity for a period of time. It enables general-purpose processors to run at full-capacity speed, and allows general-purpose workloads to run on zIIP processors. This boost period accelerates the entire recovery process in the partition(s) being boosted. Security is an on-going and growing issue for anyone with a computer, and enterprises especially. Back in the summer, the annual Evil Internet Minute report1 from RiskIQ, suggested that cyber-criminals cost the global economy $2.9 million every minute in 2018, for a total of $1.5 trillion. The report concluded this after analysing proprietary research and data derived from the volume of malicious activity on the Internet. Major companies are paying $25 per Internet minute because of security breaches, while hacks on cryptocurrency exchanges cost The Arcati Mainframe Yearbook 2020 $1,930. Criminals are leveraging multiple tactics, Publisher: Mark Lillycrop from ‘malvertising’ to phishing and supply chain Editorial Director: Trevor Eddolls attacks. The loss from phishing attacks alone is Contributors: Broadcom, Compuware, Model 9, $17,700 per minute. Global ransomware events BMC, Mark Wilson in 2019 were projected to total $22,184 by the © 2020, Arcati Limited. minute. Cyber-criminals have also increased their targets on e-commerce with Magecart hacks, All company and product names mentioned in this which grew by 20% over the last year. The study publication remain the property of their respective found 0.21 Magecart attacks were detected every owners. minute. It also found that in each Internet minute: This Yearbook is the copyright of Arcati Limited, and 8,100 identifier records are compromised, seven may not be reproduced or distributed in whole or in part malicious redirectors occur, and 0.32 apps are without the permission of the owner. A licence for internal blacklisted. Plus, there are 2.4 phish traversing e-mail or intranet distribution may be obtained from the the Internet per minute. publisher. Please contact Arcati for details. © Arcati Limited, 2020 3 Arcati Mainframe Yearbook 2020 Mainframe strategy IBM’s “Cost of a Data Breach Report”2, in 2019, highlighted the financial impact that organizations can feel for years after an incident. The actual cost of a breach has risen from $3.86m to $3.92m over the past year, and by over 12% over the past five years. According to IBM, in the USA, the cost of a breach is $8.19m. For companies with fewer than 500 employees, losses averaged out at over $2.5m, a potentially fatal sum. Mega breaches of over one million records cost $42m, while those of 50 million records are estimated to cost companies $388m. IBM also found that on average 67% of data breach costs were realized within the first year after a breach, but over a fifth (22%) accrued in the second year and another 11% accrued more than two years after the initial incident. Organizations in highly-regulated environments (like healthcare and financial services) were more likely to see higher costs in the second and third years, apparently. Malicious breaches accounted for the majority (51%) of cases, up 21% over the past six years, and cost firms more – on average $4.45m per breach. Accidental breaches, 49% of all incidents, cost slightly less than the global breach average. Human error cost $3.5m, and system glitches cost $3.24m. For the ninth year in a row, healthcare organizations suffered the highest cost of a breach – nearly $6.5m on average. IBM suggested that extensively tested incident response plans can minimize the financial impact of a breach, saving on average $1.23m. Other factors affecting the cost of a breach include how many records were lost, whether the breach came from a third party, and whether the victim organization had in place security automation tech and/or used encryption extensively. IBM’s most significant acquisition this year concluded on 9 July when it acquired Red Hat, which is best known for its version of Linux. IBM acquired all the issued and outstanding common shares of Red Hat for $190.00 per share in cash, representing a total equity value of around $34 billion. At the time, IBM said that the companies together will accelerate innovation by offering a next-generation hybrid multi-cloud platform. Based on open source technologies, such as Linux and Kubernetes, the platform will allow businesses to securely deploy, run, and manage data and applications on-premises and on private and multiple public clouds. The year ended with the news that Compuware intends to acquire Innovation Data Processing. This, perhaps, is another example of larger companies looking round for mid-range companies to strengthen their product range – like Syncsort’s acquisition of Pitney Bowes’ software and data business. As well as Data Privacy Passports, introduced with the z15 mainframe, some other acronyms we’re getting used to this year are zCX, WMLz, and Db2ZAI. zCX stands for z/OS Container Extensions (zCX), which let you run Linux capabilities in a container on z/OS. WMLz stands for IBM Watson Machine Learning for z/OS. It’s designed to simplify the production implementation of AI models. Users can develop models where they want. And, users can readily deploy them within their transaction applications for real-time insight. Db2ZAI stands for IBM Db2 AI for z/OS, which can optimize a Db2 for z/OS engine to determine the best-performing query access paths, based on the workload characteristics. You may also have come across fog computing or fog networking or fogging, which is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and then routes it over the Internet backbone. Looking forward to 2020, it’s interesting to see what Gartner highlights as the top 10 strategic technology trends for the year. They are: • Hyperautomation – the combination of multiple

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    182 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us