Dave Schipper – BMC Software | Blogs https://s7280.pcdn.co Wed, 17 Aug 2022 09:05:41 +0000 en-US hourly 1 https://s7280.pcdn.co/wp-content/uploads/2016/04/bmc_favicon-300x300-36x36.png Dave Schipper – BMC Software | Blogs https://s7280.pcdn.co 32 32 New Enhancements Expand Your IMS Read Capture Capability https://s7280.pcdn.co/expand-your-ims-read-capture-capability-with-bmc-ami-defender/ Wed, 06 Apr 2022 07:36:26 +0000 https://www.bmc.com/blogs/?p=51944 Data protection may never have been more important than it is today, with well-documented challenges that include digitalization, explosive data growth, cyberthreats, and the rapid rise of remote work. Protecting sensitive data on the mainframe is too often dependent on tooling that is designed for a bygone era. If your sensitive data has been accessed, […]]]>

Data protection may never have been more important than it is today, with well-documented challenges that include digitalization, explosive data growth, cyberthreats, and the rapid rise of remote work.

Protecting sensitive data on the mainframe is too often dependent on tooling that is designed for a bygone era. If your sensitive data has been accessed, you can’t wait hours to find out or take action. An effective defense requires more insight, up-to-the-second information, and better visibility for security teams. However, in the mainframe world, security teams may not have the real-time visibility they need to reduce response times.

BMC AMI Datastream for IMS delivers up-to-the-second IMS security alerts to your security information and event management (SIEM), and gives security admins visibility into user events like attempts to view or change the sensitive data found in your IMS environment—even if they come from privileged user accounts.

For compliance auditing, BMC AMI Datastream for IMS provides the proper audit trails and standards-based archiving to adhere to regulations such as PCI DSS, HIPAA, GDPR, GLBA, SOX, IRS Pub. 1075, and other industry standards. Real-time alerting and compliance auditing effectively helps teams close the window of opportunity for attackers and move their mean time to detect (MTTD) from hours to seconds.

In our latest release, we’ve added the ability to capture IMS read activity for full-function IMS databases—information that is not in the IMS log—so you can see who is reading your IMS databases and what they are viewing. Knowing what is being read is critical for preventing unauthorized access to health information, credit card numbers, and other personally identifiable information (PII) stored in your IMS databases.

In addition, we have enhanced the filter creation panel options to make it faster and easier to create and modify your BMC AMI Datastream for IMS filters to capture and extract the exact data you need for security analysis and analytics engine input.

To learn more about BMC AMI Datastream for IMS, please visit this page. For more information about this release, or to learn how to get started, check out our latest release notes and technical documentation here.

]]>