Mark Wilson – BMC Software | Blogs https://s7280.pcdn.co Wed, 06 Apr 2022 09:09:14 +0000 en-US hourly 1 https://s7280.pcdn.co/wp-content/uploads/2016/04/bmc_favicon-300x300-36x36.png Mark Wilson – BMC Software | Blogs https://s7280.pcdn.co 32 32 Creating the Next Generation: BMC’s Mainframer in Training Program https://s7280.pcdn.co/bmc-mainframe-training-program/ Fri, 04 Feb 2022 14:57:47 +0000 https://www.bmc.com/blogs/?p=51656 Oscar Wilde famously said, “You can never be overdressed or overeducated.” I’m not sure about the former but I tend to agree with the latter, especially in our industry. Given the systems, platforms, and clients that we support, the learning journey is complex and continuous. And it has to start somewhere. In 2020, I wrote […]]]>

Oscar Wilde famously said, “You can never be overdressed or overeducated.” I’m not sure about the former but I tend to agree with the latter, especially in our industry. Given the systems, platforms, and clients that we support, the learning journey is complex and continuous. And it has to start somewhere.

In 2020, I wrote that a post-coronavirus world would present new opportunities to develop the next generation of IT professionals, and new ways for organizations to access and benefit from their skills. With a move from predominantly onsite working to remote and home working, plus the opening up of a potentially bigger global talent pool, the demand for skills has never been greater—and at a time when many organizations continue to face serious skills shortages.

If current trends continue, it is likely that within the next five years, the mainframe space will have tens of thousands of unfilled jobs globally. Yet, as the BMC 2021 Mainframe Survey reported, more than 90 percent of organizations see the platform as one for long-term growth and new workloads, while 86 percent of extra-large mainframe shops expect MIPS (millions of instructions per second) to grow.

How can we meet that demand, that appetite to innovate and integrate, not only this year but in the decade ahead?

We saw this situation coming, to a degree, which is why BMC Mainframe Services established the Mainframer In Training (MIT) program a few years ago. The program has three main beneficiaries:

  • First, BMC, in developing our in-house skills and knowledge base and weaving BMC products and solutions into the training.
  • Second, and more importantly, our clients. The program provides them with the talent they need through a pipeline of next-generation IT professionals with on-the-job experience.
  • And third, the trainees themselves. The MIT program is the start of a long and rewarding journey, taking them forward while they continue developing their skills and specialisations.

During the pandemic disruptions, we recruited nine new trainees and the training moved mostly online. We’re now pressing ahead with our plans to grow the program and take it even further to cover all the areas and solutions offered by BMC.

We have also refined and streamlined the program, which typically lasts up to three years. By targeting the issues and technologies that matter most, we compressed the first year into a high-intensity, three-month bootcamp, including hands-on work. Age demographics are working against us, and we recognized that we needed to speed up the process. Seeing-and-doing in real life is the most effective teacher—logging on and starting to understand how this world fits together, the applications, databases, subsystems, storage, and networks, and performing basic tasks to help keep things running.

Of course, two to three years is still merely an introduction as this field is so vast and complex. Every day is a school day for a mainframer, even if they’ve been in the job for 30 years. MIT is about laying the best foundations to not only underpin an individual’s career but also provide the industry with that strong base and greater confidence that the skills they need do exist.

Another important aspect is mentoring for developmental and career guidance by pairing trainees with a technical buddy from about six months in. The buddy works with their trainee on a day-to-day basis, and the relationship starts with them shadowing each other. They keep in regular contact, with the buddy dropping in to check the trainee’s work. This is where the real learning journey begins, in the real world with an experienced professional by your side.

As you’d expect, we’re also keen to promote diversity and inclusion in the program, and we do have a diverse group. Of the new cohort—four in India and four in the UK—there’s a 50/50 gender split. We want to attract all talents and recognize the value that different voices and backgrounds bring.

Representation across the board is important to me as a manager, and important to BMC. Even the words used in an advert calling for applications can impact who responds and why. When recruiting trainees, I’ve found that their attitude and aptitude are far more important than their previous experience in technology. Are they go-getters? Are they prepared to learn, to expand their minds? Will they stick with it, through thick and thin?

As I wrote back in 2020, “Our clients trust us to provide the trained people and expert services they need, when they need them. Our trainees trust us to give them the best experience we can, imparting the knowledge and skills they need to progress, to support their current and future employers. And our own people and skills base have to be more flexible than ever, ready to pivot to deliver whatever is needed.”

As this year’s BMC Mainframe Survey made clear, unprecedented business disruption and significant growth are driving digital transformations across many organizations. BMC’s MIT program is an increasingly vital element in enabling those transformations, shaping the enterprise IT and mainframe teams of tomorrow.

]]>
The Shark Is Broken: Mainframe Projects To Get Your Teeth Into https://www.bmc.com/blogs/mainframe-projects-services-shark-broken/ Tue, 11 Jan 2022 15:51:57 +0000 https://www.bmc.com/blogs/?p=51441 Pre-pandemic, I paraphrased a line from Jaws to describe a pressing need to expand our team and add resources to meet rising, worldwide client demand when I said, “We’re gonna need a bigger boat.” Mainframe shops (and their customers on the business side) had been clamoring for heightened security, targeted project and application expertise, ad […]]]>

Pre-pandemic, I paraphrased a line from Jaws to describe a pressing need to expand our team and add resources to meet rising, worldwide client demand when I said, “We’re gonna need a bigger boat.” Mainframe shops (and their customers on the business side) had been clamoring for heightened security, targeted project and application expertise, ad hoc staffing and, indeed, a wide range of mainframe-focused managed and professional services.

That demand for BMC Mainframe Services has continued to grow in the last two years. We’ve secured that bigger boat and are now steaming ahead for our clients, casting our net wider and landing interesting catches of every size. I don’t have to tell tall tales about the ones that got away because we’ve been reeling them in. I’ll give you a few examples of those “bigger boat” projects.

First, a small one: a tiddler, you may think, but still an important need. A US financial services company wanted to replace its current tape management solution with a solution from BMC. We had just six weeks to implement BMC Helix Control-M/Tape across three systems before the company’s previous contract expired. That’s how fast we can move, particularly with a focused requirement like this one.

Second, a medium-sized fish: a large media organization in the US and UK needed to swap out its current tools for a suite of BMC solutions over a nine-month period. This included automation, tape, data, and performance management tools. That was completed on time.

Third, the big one—the whopper—is just getting underway. It’s an interesting story. For a single client, we’ve begun four projects that actually represent the start of a three-year journey to remove its current software stack and replace it with a largely BMC stack that includes pretty much every BMC solution. Data, performance, security, automation, tape—you name it. If you’ll forgive me mixing my fishy allusions, this one is a Moby Dick. If not a whale of a project, then perhaps a great white shark.

Which brings me back to Jaws and another thought that occurred to me recently. A well-reviewed play that has been running in London’s West End focuses on the behind-the scenes problems during filming of the movie, and especially the fact that the mechanical shark, Bruce, kept breaking down. Hence the play’s title, “The Shark is Broken.”.

This reminded me of another reason why we’re seeing continued and rising demand from clients around the world. Many are fed up with being mishandled by the vendors they chose in the past. As in any business or marketplace, there are always sharks circling. By that I mean vendors with questionable business practices such as suddenly changing terms and conditions attached to their software products or imposing an unwarranted 300 percent price increase overnight.

But times change and people aren’t stupid. They can tell when a shark is broken. Organizations recognize if they are sailing too close to the wind, through no fault of their own, and need to change course. When it’s time to make that change, BMC is ready to help them place a steady hand on the wheel.

]]>
Think Like a Hacker, Act Like an Engineer https://www.bmc.com/blogs/mainframe-sysprog-think-like-hacker-act-like-engineer/ Tue, 14 Dec 2021 14:48:32 +0000 https://www.bmc.com/blogs/?p=51299 System programmers can and should play a critical role in security and disaster planning and recovery, helping protect the mainframe from accidental and malicious acts in a complex and evolving cyberthreat landscape. I was only 16 years old when I started working with mainframes. That was back in May 1980, a month that also saw […]]]>

System programmers can and should play a critical role in security and disaster planning and recovery, helping protect the mainframe from accidental and malicious acts in a complex and evolving cyberthreat landscape.

I was only 16 years old when I started working with mainframes. That was back in May 1980, a month that also saw the release of The Empire Strikes Back in the UK and USA. As I’ve written previously, in the intervening years, neither big iron nor the Star Wars universe have been very far away. In fact, both are proliferating today more than ever. It’s a funny old world.

I was a system programmer for many years. I knew that world then and I still know it now. According to IBM®, ”In a mainframe IT organization, the system programmer (or systems programmer) plays a central role.” In practice, this means installing, customizing, and maintaining the operating system, and installing and upgrading products that run on the system.

IBM’s definition then lists various tasks, including planning hardware and software system upgrades and changes in configuration, automating operations, capacity planning, integration testing, tuning, and so on.

So, what’s missing?

What can system programmers really do, above and beyond that list? The missing part of the jigsaw puzzle is security.

The mainframe is probably the most securable platform on the planet, but it does not come secure out of the box. And the mainframe has become mainstream. No longer existing in “splendid isolation,” it’s an interconnected system that, for many enterprises, is the hub for all major business applications. To the bad actors, internal or external, it’s simply another server to be targeted. And like any part of modern technology or business, accidents can happen, compromising this critical platform.

The cyberthreat is real and we all have a part to play in keeping the mainframe secure. The world keeps changing and the goal posts keep shifting. When IBM decided to put containers on a mainframe, it perhaps didn’t foresee that skilled security professionals would rapidly demonstrate the reality of escaping a container on a mainframe, breaking the IBM z/OS® Container Extensions (zCX) Docker environment in both directions.

The cybercriminals just need a way in. Spear phishing attacks are only one of many, many methods, meaning a data breach, ransomware, or malware attack may be just around the corner. So, given that backdrop, what’s readily available to help system programmers with security, governance, and compliance issues?

From a hardware perspective, manufacturers like IBM and Dell EMC are working to combat cyberthreats. Hardware requirements need to focus on a number of capabilities, such as surgical and catastrophic recovery, forensic analysis, and data validation. IBM Z® Cyber Vault has reduced time-to-recovery from days to minutes. Similarly, Dell EMC Cyber Data Protection for mainframe data helps strengthen against attacks while reducing recovery time.

There are also software solutions available, including BMC AMI Datastream for real-time mainframe threat detection, which delivers mainframe access data to a distributed SIEM (security information and event management) system in real time, for a unified, multi-platform view of enterprise security events in a single console. Other examples include IBM solutions for security administration and reporting, MainTegrity solutions for file integrity monitoring (FIM) and KRI solutions for software vulnerability scanning.

Spanning hardware, software, planning and processes, you can also access external security consulting expertise, professional services, and managed services from a range of third parties (including BMC) – to better support your internal efforts. These providers can deliver everything from pen testing and security audits to staff augmentation and fully managed security solutions.

My basic point is that, in a world where hackers see the mainframe as just another computer, system programmers have to adapt and change, updating our thinking. We have to use all of the weapons at our disposal: assess the threats, weigh-up our options, then deploy the right solutions and approaches.

Today’s landscape isn’t only about the authorized program facility (APF) to identify system or user programs that may use sensitive functions, or about security privileges (Special, Operations, NON-CNCL, etc.) We also need to consider IBM z/OS® UNIX System Services (z/OS UNIX, aka USS), FTP with the mainframe, the Secure Shell (SSH) protocol on the mainframe, and the list goes on. What about containers on IBM Z® and Z for Linux®?

System programmers have to be more involved in security matters, taking ownership where it makes sense. In short, to prepare for the cybersecurity threats of today and tomorrow, we must think like a hacker but act like an engineer.

Note: this blog is a shortened version of a BMC white paper.

]]>
Breaking Free: Avoid Vendor Lock-In https://www.bmc.com/blogs/avoid-vendor-lock-in/ Tue, 12 Oct 2021 11:41:38 +0000 https://www.bmc.com/blogs/?p=50811 Change isn’t always easy. But if the last 18 months taught us anything, it’s that change (and the unexpected) are inevitable. While we can’t predict the future, we can still look ahead to a degree and make the best choices for ourselves, and ideally make sure that includes the ability to continue adapting to new […]]]>

Change isn’t always easy. But if the last 18 months taught us anything, it’s that change (and the unexpected) are inevitable. While we can’t predict the future, we can still look ahead to a degree and make the best choices for ourselves, and ideally make sure that includes the ability to continue adapting to new and changed circumstances.

The same applies to our technology choices; technology that our organizations depend on today more than ever. Our technology has to be as flexible and adaptable as it is cost-efficient.

Of course, some changes are better than others. The tools that we use and the value they deliver are sometimes impacted by changes brought about by vendors, based on their own shifting priorities rather than your own. Company mergers and acquisitions don’t always mean more choice. Experience has shown they can mean lock-in for some organizations, to annual price rises, for example. They might bring unnecessary constraints imposed by, say, a bundling model, in which the price you pay is unfairly tied to other solutions in a contract.

Such practices don’t benefit the customer. In fact, they actually throw up barriers to achieving precisely what you need: the flexibility to adopt whatever best-of-breed solutions you want, when you want them, to accelerate your digital transformation. To help you work faster, smarter, and more cost efficiently.

We’re contacted every day by customers in this situation, asking if we can help. We can. What’s more, BMC can help across the piece, offering a viable and sustainable total-solution approach. This can cover anything from workload automation and job scheduling through infrastructure and performance monitoring to mainframe security, databases, capacity optimization, service management – the list goes on.

We know we can do this because, in an example of eating our own cooking, BMC has successfully done it: moving away from solutions that no longer delivered the flexibility we needed, and reducing our costs in the process.

I was chatting with an industry analyst recently about a vendor change that led to its priorities changing, and the impacts on its customers. The analyst cited a lack of evidence of people moving away from that vendor’s tools. But this is only to be expected, I said, as contracts are still running and it’s too early to see those impacts. But the clock is ticking. People aren’t stupid. I firmly believe a trickle will become a flood in the months and years ahead, as organizations make a positive change and break free.

If you find yourself in this situation, ask a few questions. What are the anticipated costs involving these tools going forward? What level of support do we currently receive for these solutions? And do these products have a future roadmap? The answers will help you to plan your next move.

]]>
Sounding the Alarm: the Top Mainframe Security Threats https://www.bmc.com/blogs/top-mainframe-security-threats/ Wed, 30 Jun 2021 06:13:25 +0000 https://www.bmc.com/blogs/?p=50016 The headlines keep on coming. British Airways data breach: thousands of customers given more time to claim compensation. Amazon data breach fears, European e-ticketing platform Ticketcounter extorted in data breach, Oxfam Australia supporters embroiled in new data breach. And on and on it goes. While these breaches don’t specifically relate to mainframes, it’s clear we […]]]>

The headlines keep on coming. British Airways data breach: thousands of customers given more time to claim compensation. Amazon data breach fears, European e-ticketing platform Ticketcounter extorted in data breach, Oxfam Australia supporters embroiled in new data breach. And on and on it goes.

While these breaches don’t specifically relate to mainframes, it’s clear we are living in dangerous times. Especially when the mainframe continues to be the processing and transactional heart of so many organizations and is increasingly viewed as a hub for innovation. In every location where our team carries out a security audit or penetration test, we always expose significant, previously unknown security concerns. So, why is the mainframe at risk to this degree?

The people who truly “know the mainframe” and understand it have traditionally been a small group. This complexity has led most everyone else to conclude that it’s virtually secure by default. It’s not. There’s also a general lack of understanding around the detail of mainframe security by the very people tasked with keeping it secure. This leads to vulnerabilities.

As an example, individuals may not properly understand the risks involved in giving someone a superuser privilege. We have workplaces where employees are given read access to everything. But in the mainframe world, if you can read something—especially data—you can copy it. If you can copy, you can download. And if you can download, you can potentially exfiltrate the data.

In addition, the average person can’t just buy a mainframe, install the software, and start testing it. The technology is still too costly and too tightly controlled to be reverse engineered. But that’s changing as more information is shared online. Knowledge about the platform and how it can be hacked is becoming more widespread.

With that backdrop in mind, I want to share the top threats we’ve identified in the course of our work.

  1. Too many users with escalated privileges. In this situation, the Superuser privilege can be inappropriately used, granting users excessive access to system services and OMVS/USS (Unix System Services) resources and data. This means data can be easily copied, deleted, or held to ransom, and the ramifications can be huge. With read access so often the norm, instead, the default access should actually be none. This is about applying the principle of least privilege (PoLP).
  1. Privilege escalation vulnerabilities. Many enterprises grant excessive access to libraries and authorized datasets. This increases the risk of someone accessing your files to elevate their own permissions on the system. That could mean taking yourself from problem state, where normal user/applications run, to supervisor state: a supposedly “protected” and authorized elevated state in which a user has free rein to do all the clever stuff—or to make mischief. In the non-mainframe world, this would be called getting route-level privileges. If bad actors can get to that state, they gain the ability to read and write all data, including memory.
  1. Default passwords and weak password management. Password insecurity is rife; it’s been estimated that it would take a hacker less than a second to crack eight of the ten most commonly used passwords. Password vaults are not commonly used. Organizations should not solely rely on passwords and must ensure strong password controls, avoiding static passwords and ensuring they are changed regularly. For mainframe privileged users, multi-factor authentication (MFA) is a must.
  1. Access to sensitive and cryptographic data. Additional processes, procedures, and rigor are urgently required around protecting cryptographic data and keys. Read access to the database allows it to be copied and downloaded. Data set profiles that are poorly configured allow read, update, and control access. This means data can be copied, updated, or downloaded. Once downloaded, offline password-cracking tools can reveal passwords in the database.
  1. “Faceless” accounts. This is another possible attack vector for hackers that occurs when the organization needs an account for a system task but there’s no real person or actual user associated with it. These accounts often come with system-level privileges. They typically have a password that is rarely changed and, if they do have a password, it’s usually easy to guess. Have you protected all of your “faceless” accounts properly and are they appropriately defined?

In most cases, weak controls and inadequate security measures are exacerbated by a number of factors. These can include insufficient headcount; inadequate resourcing or a lack of in-house skills combined with poor system configuration; and processes that are no longer fit-for-purpose or simply not in place. Many sites are running outdated (or have a complete absence of) appropriate security tools and technologies.

The best way to start securing your mainframe is to work towards a Zero Trust culture. And when you’re tackling a specialist area like this, you may need additional firepower. Few people would attempt to rewire their house or apartment and deal with the dangers of electricity without having the right tools on hand—or, indeed, without being an experienced and accredited electrician. Instead, we pick up the phone or head online to find someone who knows what they’re doing.

With so much at stake, it may be time to call in the experts.

]]>
5 steps to maximize your mainframe potential https://www.bmc.com/blogs/5-steps-to-maximize-mainframe-potential/ Wed, 09 Jun 2021 15:46:02 +0000 https://www.bmc.com/blogs/?p=49852 What gets you up in the morning? What motivates you, and puts a spring in your step? For me, in the mainframe world, it’s about helping people to achieve more in their day-to-day work. Through better and more secure infrastructure. Through targeted support where and when it’s needed most. Through expert managed services, and DevOps […]]]>

What gets you up in the morning? What motivates you, and puts a spring in your step? For me, in the mainframe world, it’s about helping people to achieve more in their day-to-day work. Through better and more secure infrastructure. Through targeted support where and when it’s needed most. Through expert managed services, and DevOps to create and share new value, and so on.

It’s that desire to make a difference, or at least try to, and especially when it comes to helping people to secure their systems. And, increasingly, I think we’re having a real impact.

I’ve written before about a sense of complacency when it comes to the risks faced and the realities involved in securing the mainframe. In other quarters, meanwhile, the image of mainframes still persists as a set of clunky, complicated and hard-to-learn technologies. But the world is changed and new paradigms are developing. Changed attitudes, new directions, are a positive side-effect of the COVID-19 crisis, which has undoubtedly increased the appetite for digital transformation and created a “rush to innovate”.

I’ve never really subscribed to “necessity is the mother of invention” but it is clear from history that times of crisis foster innovation and accelerate development. For instance, the Long Depression of the late 19th century brought the lightbulb, modern steam turbine and refrigeration. The carnage of the First World War also led to synthetic rubber, blood banks, the modern zip fastener and more. Innovations from the Second World War include super glue, modern computing, mass-produced antibiotics. We may be on the cusp of a new age of ideas.

Despite the devastating impacts of the pandemic in many areas, new ideas and fresh thinking are also emerging. Digital transformation requires innovation and, in turn, spawns new innovation, enabling new products and services to emerge. The mainframe as a hub for innovation is something we’re increasingly seeing in the field, with a renewed desire to secure, modernize and optimize the platform.

My team recently performed Penetration Tests and Security Assessments for a handful of organizations that, it seems, have been taking mainframe security and operations seriously for the last few years. For the first time in our team’s history, we are starting to see systems that are well set up, well-structured, and well secured, and that organizations have the right people, processes and skills in place. It’s great to see. The only ‘downside’ is that the more the situation improves, the more calls I’ll get from frustrated colleagues saying “Mark, we can’t find anything… where can we look next? Help us out here, we can’t get in!” The more calls like that, the better.

Of course, two or three out of all mainframe sites in the world isn’t enough, but it’s a start. Great oaks from little acorns grow, and all that. I truly believe we’re starting to make a real difference. If an organization has the will and/or demand to put their own house in order then it’s (almost always) never too late. Five steps can make a big difference.

First, you need to understand your current security posture. It may be strong (like the organizations we are starting to see) but chances are, there will be room for improvements. Properly understanding where you are today is typically done via a penetration test or security assessment by experts, and ideally the latter to get the full picture.

Once you know that, the second step is to understand where you want to be. This is about your direction of travel as a mainframe house and your role as a service provider; what you need to do, and your aspirations for the future. For example, do you want to be that emerging hub for innovation, supporting different aspects of the organization as its transformation continues and new digital products and services are required? Is your core role as the undisputed transactional and storage powerhouse of the data center? Do you want to be both–or perhaps something even more?

Third, once you know where you are now and where you want to be, you can start to build your plan, your roadmap to getting there. What expertise and resources will you need? Is your current headcount enough or do you need to look outside the business and, if so, where? What targets and milestones will you set, to ensure consistent progress towards your goals? How will you measure success?

Fourth, it’s time to execute the plan. Depending on what you need to so, and the resources available, this is often another point where external partners are called in; people with the additional skills and resources required to help you get from A to B and (at some point) Z in faster and more focused ways.

And fifth, you need to check, test and assess what you have done, closing the loop. Strong foundations are essential but the work itself never ends, making continuous improvements as and when they are needed, to stay on track and keep pace with new and evolving business demands.

Of course, all of that is easier said than done. But the sooner we start, the sooner we can reap the benefits.

]]>
Welcome to the hub: the original cloud is driving digital transformation https://www.bmc.com/blogs/cloud-is-driving-digital-transformation/ Tue, 04 May 2021 08:16:04 +0000 https://www.bmc.com/blogs/?p=49509 The mainframe isn’t quite the center of the universe, but it’s not far off The mainframe sits at the heart of the data center: it’s an essential hub, the focal point, with the other spokes of a business coming off it. It’s the reliable data server, the system of record. It’s the super-fast transaction server, […]]]>

The mainframe isn’t quite the center of the universe, but it’s not far off

The mainframe sits at the heart of the data center: it’s an essential hub, the focal point, with the other spokes of a business coming off it. It’s the reliable data server, the system of record. It’s the super-fast transaction server, the transactional beast of burden. It’s the security server for many, thanks to its innate securability.

I’m far from being the first person to suggest that the mainframe was the original cloud. If you implemented and used a mainframe infrastructure in the effective ways, you were gaining all the benefits of cloud computing decades before the term came into common usage in the mid-nineties (cloud imagery had, of course, been used for many years to represent IT and other networks).

If you define the cloud as the on-demand availability of IT system resources, in particular data storage and computing (processing and transactional) power, without direct active management by the end user—then we’re talking about the mainframe. What the cloud can do, the mainframe has been doing for a great deal longer, and doing it extremely well.

Scalability? No problem. While a major benefit of cloud is the ability to access resources as and when you need them, the sheer computing power of the mainframe means you can throw whatever you like at it. In the most recent BMC Mainframe Survey, more than half of respondents reported an increase in transaction volumes and 47% reported an increase in data volumes. 68% of respondents expected MIPS, the mainframe’s measure of computing performance, to grow. The platform can handle it.

Availability: again, mainframes match if not exceed cloud availability. Indeed, the reliability of the mainframe is a big selling point for the technology. Someone once wrote that you can measure mainframe uptime in decades. Today’s mainframe is also as flexible and agile as cloud platforms, in terms of the choice and freedoms that it gives you in, for example, virtualization and resource allocation.

Going further than ‘traditional’ cloud benefits, the mainframe is also, potentially, the most secure platform around, it just takes a little time and application to ensure it attains and retains that security posture. By contrast, cloud can present a number of security issues and challenges, including visibility and control of your data. Cloud providers treat security issues and risks as a shared responsibility with their cloud customer. A well-managed secure mainframe takes away a great many of those risks.

As last year’s BMC Mainframe Survey concluded, “The mainframe is front-and-center in today’s digital business environment” and is “viewed as a valuable, growing, and evolving platform by IT professionals and executives… a critical component of the modern digital enterprise and an emerging hub of DevOps innovation. Workloads are growing, while large organizations continue to host much of their data on the mainframe.”

“Executives and technical professionals have a high opinion of the mainframe, and they’re putting it to work more and more to support digital business.” So how can we help to make this happen?

Funnily enough, in an era of convergence and connectivity, cloud and mainframe are coming together: the mainframe in its role as the backbone of the data center, for data storage and processing, combined with cloud’s ability to bring additional innovation (in analytics, say) along with accessibility and economies to the party. This could mean making mainframe data available via a (private) cloud to the applications and people who can utilize and exploit those resources in the most effective ways.

We already know the mainframe can be truly transformative; an agent for change, a hub for innovation. But this won’t just happen, either, and we need to put the hours in.

In an Information Age article, Compuware’s Stuart Ashby suggested how we might “ignite a mainframe transformation with three key mindset changes”. Describing the mainframe as “the bedrock of IT innovation for over five decades, providing the reliability, scalability, performance, and security that organisations need”, he says organizations can address the challenges of change in three ways. First, leaving traditional waterfall thinking at the door and instead approaching incremental change and improvements in more organic and flexible ways. Second, “reaching hearts and minds” through measurement, identifying value and benefits via a “before and after” approach. And third, redefining what it actually means to develop: working towards building a software delivery ecosystem that redefines what it is to be a developer. For example, increasing the use of automation, with all of the opportunities that brings.

We don’t have to look far to see the value the mainframe already brings, and the impact it will continue to have. The platform is central to how many of the world’s leading brands are conducting their business: retailing giant Walmart (the world’s largest company by revenue), Nike (the world’s largest supplier of athletic shoes and apparel), Bank of America (one of the biggest banks and largest companies in the US)—the list goes on. Take a look around the world’s leading banks, utilities, retailers, health service providers, even the military, and you’ll find a mainframe in action. The transformation work continues.

]]>
Securing the Mainframe: What are your Priorities? https://www.bmc.com/blogs/securing-the-mainframe/ Thu, 15 Apr 2021 10:41:02 +0000 https://www.bmc.com/blogs/?p=49323 It never rains but it pours. In other words, when one bad thing happens, other bad things often follow in its wake, sometimes to excess. The SolarWinds Orion supply chain compromise was yet another in a seemingly endless stream of hacks and attacks. Stormy times. It’s also been said that the best time to fix […]]]>

It never rains but it pours. In other words, when one bad thing happens, other bad things often follow in its wake, sometimes to excess. The SolarWinds Orion supply chain compromise was yet another in a seemingly endless stream of hacks and attacks. Stormy times.

It’s also been said that the best time to fix a leaky roof is when the sun is shining – ideally before the bad weather hits and does its damage. I’m mixing my water metaphors, but if you’re in the fortunate position that the rising tide of cybercrime hasn’t breached your own organization yet, there’s no time like the present to check your defenses, confirm they are intact, and plug any gaps.

Here, in no particular order, are some the issues and activities that should be on the current priority list of mainframe teams, security experts, CISOs and, indeed, CEOs.

The most recent BMC Annual Mainframe Survey revealed that today’s mainframe is consolidated as a core element of the modern digital enterprise; a hub for innovation, helping organizations to create and deliver the “intuitive, customer-centric digital experiences” of tomorrow. The other big takeaway from the survey was that security and compliance are now the top mainframe priorities.

These increased digital demands will require new and enhanced processes. For example, with calls to update applications on the mainframe faster and more efficiently, we’ll see further developments in DevOps. As a BMC colleague wrote recently, “With the right procedures, tooling, education, culture shift and mind set, the business-critical applications that currently run on mainframes can easily be integrated into a DevOps operation.” This reflects the continued prevalence and power of the mainframe: it’s fast, scalable, resilient, securable, flexible and available, able to “handle the workload of thousands of x86 servers for a fraction of the TCO and manpower.”

But the usual storm clouds are gathering, and threaten to rain on our parade. As more people become interested in mainframe tech, more information appears on the web – and how it can be hacked. The only thing stopping a tsunami of attacks right now is the platform itself: it’s still too expensive and tightly controlled to be accessed, taken apart and reverse engineered. But that will change. So CISOs need to focus on ramping up their defenses: from access rights, password policies and insecure applications to overprivileged users, the threat of unencrypted communications and more.

This means taking more active steps to embed a ‘Zero Trust’ culture. We live in a mainframe world where READ access is so often the norm, when default access should actually be NONE. We should be applying the principle of least privilege (PoLP). Organizations need to up their game in terms of threat detection and response capabilities, moving to Extended Detection and Response (XDR). The threat landscape is continuing to shift, evolve and mutate – yes, like a virus. Harnessing automation, AI and machine learning through XDR may be our salvation; a shot in the arm for mainframe security.

To support these and other initiatives, another trend is increased demand for mainframe services, including security assessments and pen testing. With the pandemic and home working accelerating digital transformation in so many organizations, new processes and security challenges have emerged. With a persistent skills and resource shortage, engaging external experts makes sense: extra people for specialist projects, keeping the lights on, or improving your security posture.

In summary, I think three main drivers will help to shape our priorities in the months and years ahead. First, the huge additional demand for employees to work remotely and access their corporate systems from home, requiring new processes and creating new threats. Second, continuing complacency and the mistaken belief that the mainframe is inherently secure: it isn’t, and we need to plan and deliver a Zero Trust approach. And third, the increasing threats posed in a connected world by a supply-chain attack. The bad actors don’t need to get to your production systems, which may be tightly protected. They can instead target the systems of a supplier or someone else in your supply chain. Securing the supply chain will be another priority.

We can do more, and the tools and expertise are already out there. We need better analytics, automation and adaptability, drawing on external expertise if needed, all underpinned by informed governance and the latest policy-based approaches. It won’t always be plain sailing but it’s the only way we can start to roll back the tide. Nobody wants to go under.

]]>
Fallout from the SolarWinds Supply Chain Compromise https://www.bmc.com/blogs/fallout-from-solarwinds-supply-chain-compromise/ Fri, 02 Apr 2021 00:00:28 +0000 https://www.bmc.com/blogs/?p=49241 It’s an ill wind that blows no good, and profits nobody. That old nautical phrase popped into my head when I heard about the SolarWinds Orion supply chain compromise. Yet this may be one case where something good results from something very bad. I read recently that the hackers likely gained access using compromised credentials […]]]>

It’s an ill wind that blows no good, and profits nobody. That old nautical phrase popped into my head when I heard about the SolarWinds Orion supply chain compromise. Yet this may be one case where something good results from something very bad.

I read recently that the hackers likely gained access using compromised credentials and/or a third party application that took advantage of a zero-day vulnerability. The SolarWinds’ CEO later confirmed that “suspicious activity” in his Office 365 email account allowed the bad actors to access and exploit the Orion software development environment. It’s believed the hackers first tested their ability to insert malicious code into Orion network management software as early as October 2019. The hackers apparently had access to the company’s emails for NINE months.

“So what?” you might say. Why does it matter for the rest of us, and the mainframe world in particular?

The hack was clearly very bad news for the eight US federal agencies affected, which included the FBI and the Pentagon, along with up to 18,000 other SolarWinds customers attacked with malware. Systems were monitored, data and IP harvested.

In fact, it’s been reported since that around one-third of the private sector and government victims of this “colossal hacking campaign” had no direct connection to SolarWinds at all. There was probably a realization by many senior IT and security people that they had escaped by the skin of their teeth. This could have happened to anyone; you didn’t even need to be an Orion software customer. That is a “near-hit” in my mind rather than a “near-miss”.

Is there a bright side to all this? Perhaps. The compromise may have some positive outcomes by shining an even harsher light on the complacency that still exists when it comes to security, and especially the different security standards that are applied to development/supplier systems (“not really important or at risk, so why bother?”) compared to in-house production systems (“we must protect our crown jewels”).

Such attitudes continue to hamper ‘Zero Trust’ approaches, and at a time when an increasingly connected world means rising threat levels through supply chain attacks. The bad actors don’t need to get to your production systems at all, which may be tightly protected. Instead, they can look to what may be a softer target: the poorly-protected dev systems of a supplier or anyone else in your supply chain. And you won’t even know it’s happened until it’s too late.

James Stanger of the Computing Technology Industry Association (CompTIA) hit the nail on the head when he described the problem thus: “Most organizations continue to pursue traditional measures based on a firewall-first, signature-based, trusted-partner mindset.” He describes this old-school BAU approach as ‘Cowboy IT’, which he defines as “underutilization of modern tools, over-reliance on old ones and a lack of proper monitoring.” Does that sound familiar?

Securing the supply chain has become a hot topic, and we can do better. We need to lift our gazes from the threats that are closest to us – once they have been mitigated, of course – to scan the horizon, imagine what else could happen in our extended environment, and ask searching questions of partners and suppliers. All systems have to be treated as production systems, with better monitoring, more threat intelligence, and making Zero Trust the order of the day – via access rights and applying the principle of least privilege (PoLP), through more rigorous password policies, using Extended Detection and Response (XDR) capabilities, and more.

SolarWinds seems to have got the memo. In moves to lock the stable door long after the horse has bolted, the company is planning to better secure itself. This includes upgrading to “stronger and deeper endpoint protection”, expanding its Security Operations Center, strictly enforcing multi-factor authentication (MFA), expanding the use of a privilege access manager for admin accounts, and increasing pre-procurement security reviews of all vendors. It’s a start.

]]>
From Zero to Hero: Making Zero Trust Happen https://www.bmc.com/blogs/zero-trust-security/ Fri, 19 Mar 2021 07:57:51 +0000 https://www.bmc.com/blogs/?p=20453 How confident are you that your mainframe systems and data are as protected and secure as they should be? I saw recently that the global zero trust security market is predicted to grow from USD19.6 billion in 2020 to USD51.6 billion by 2026[1], with the data security segment now leading the market. There’s a reason […]]]>

How confident are you that your mainframe systems and data are as protected and secure as they should be?

I saw recently that the global zero trust security market is predicted to grow from USD19.6 billion in 2020 to USD51.6 billion by 2026[1], with the data security segment now leading the market. There’s a reason for that growth.

Zero trust is not an individual tool or a single platform. It’s a strategy, a security framework founded on the notion of “never trust, always verify” – or in simpler terms, “don’t trust anyone”. Nor is there an end point (pun intended) with the zero trust model. It’s an ongoing journey, a state of being that needs refreshing, updating, and nurturing. When you consider the enduring popularity and pervasiveness of the mainframe – its role as the system of record and mighty transactional “beast of burden” – it does seem that applying a zero trust approach in this world is long overdue.

In the latest BMC Annual Mainframe Survey, Security and Compliance were identified as the top mainframe priorities by most survey respondents. In fact, ‘Security’ over-took ‘Cost Optimization’ as the leading priority for the first time in the survey’s 15-year history. It’s very encouraging. And zero trust is the future we should be working towards, from access rights, password policies and insecure applications to overprivileged users, the threat of unencrypted communications and more.

One of the basic issues is that READ access is so often the norm. In reality, default access should be NONE. I believe it’s simple commonsense that you shouldn’t automatically trust anyone and anything, inside or outside your perimeters. The most appropriate course of action is to verify everyone and everything. For some years, I’ve been advocating the principle of least privilege (PoLP). Least privilege is simply about restricting access and permission rights for users, accounts and processes to only those resources that are absolutely necessary to carry out routine, authorized tasks. While that might be a significant change in mindset for some, the equation for me is a simple one:

Authenticating everybody + least privilege for all your data access, systems and applications =
Zero Trust Security for your mainframe shop.

Organizations should also be looking to improve their threat detection and response capabilities. Ask yourself the question, is an approach that utilizes endpoint detection and response (EDR) and managed detection and response (MDR) still enough in the “new normal” landscape of mass home and remote working? As we all know, the coronavirus pandemic and shift to home working has exposed the vulnerability of companies, individuals and nations to rising levels of cybercrime.

Extended Detection and Response (XDR) cyber security technology is coming to the fore. In a zero trust world, XDR might as well mean “anywhere, everyone and everything detection response”. The point is that every system, every user, every drift “from the normal” in behavior counts. The actionable threat intelligence provided through XDR capabilities could mean the difference between assured security levels or damaging hacks and data breaches.

While security should never sleep, the reality is that there simply are not enough talented and skilled mainframe security experts on the planet to constantly monitor all of our systems all of the time. That’s why harnessing automation, AI and machine learning through XDR is so important. Mainframe modernization work including AI and machine learning will mean you can pick up on anomalies and exceptions extremely quickly – because you’ve been tracking, learning from, and so better understanding previously undetected patterns.

What else? Oh yes, passwords. Don’t get me started on passwords. If you want to know more, you can have a read of my short paper on password insecurity, stolen credentials, data breaches and multi-factor authentication (MFA), The Problem With Passwords.

It’s clear we need to continue pushing back against the complacency that still exists, and the mistaken belief that the mainframe is inherently secure “out of the box”. The zero trust model is the best way to properly protect our systems and data. It’s no longer enough to slavishly follow what James Stanger of the Computing Technology Industry Association (CompTIA) describes as “traditional measures based on a firewall-first, signature-based, trusted-partner mindset.” He described that old-school approach as Cowboy IT: “underutilization of modern tools, over-reliance on old ones and a lack of proper monitoring.” I couldn’t agree more.

We need to better protect ourselves and the tools are already out there, as I’ve often said; it’s the mindset that is perhaps lacking. And it’s not as if there aren’t external experts you can call on for advice and guidance, either. We’re here to help. A a good starting point can be external pen testing to see just how secure you are, ideally followed by a more in-depth security assessment. The only thing you have to lose is… a leaky and potentially dangerous security posture. If you are completely secure and have nothing to worry about, it would be great to have that verified too. But can you be sure?

Zero trust is not only an excellent collaborative goal to build towards, founded on better analytics, automation and adaptiveness – it’s increasingly the only game in town when it comes to security.

]]>