AIOps Blog

New Enhancements Expand Your IMS Read Capture Capability

Man in blue shirt holding virtual data stack smiling_1400x700
2 minute read
Dave Schipper

Data protection may never have been more important than it is today, with well-documented challenges that include digitalization, explosive data growth, cyberthreats, and the rapid rise of remote work.

Protecting sensitive data on the mainframe is too often dependent on tooling that is designed for a bygone era. If your sensitive data has been accessed, you can’t wait hours to find out or take action. An effective defense requires more insight, up-to-the-second information, and better visibility for security teams. However, in the mainframe world, security teams may not have the real-time visibility they need to reduce response times.

BMC AMI Defender for IMS delivers up-to-the-second IMS security alerts to your security information and event management (SIEM), and gives security admins visibility into user events like attempts to view or change the sensitive data found in your IMS environment—even if they come from privileged user accounts.

For compliance auditing, BMC AMI Defender for IMS provides the proper audit trails and standards-based archiving to adhere to regulations such as PCI DSS, HIPAA, GDPR, GLBA, SOX, IRS Pub. 1075, and other industry standards. Real-time alerting and compliance auditing effectively helps teams close the window of opportunity for attackers and move their mean time to detect (MTTD) from hours to seconds.

In our latest release, we’ve added the ability to capture IMS read activity for full-function IMS databases—information that is not in the IMS log—so you can see who is reading your IMS databases and what they are viewing. Knowing what is being read is critical for preventing unauthorized access to health information, credit card numbers, and other personally identifiable information (PII) stored in your IMS databases.

In addition, we have enhanced the filter creation panel options to make it faster and easier to create and modify your BMC AMI Defender for IMS filters to capture and extract the exact data you need for security analysis and analytics engine input.

To learn more about BMC AMI Defender for IMS, please visit this page. For more information about this release, or to learn how to get started, check out our latest release notes and technical documentation here.

These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing blogs@bmc.com.

BMC Brings the A-Game

BMC works with 86% of the Forbes Global 50 and customers and partners around the world to create their future. With our history of innovation, industry-leading automation, operations, and service management solutions, combined with unmatched flexibility, we help organizations free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead.
Learn more about BMC ›

About the author

Dave Schipper

Dave Schipper is a lead product manager at BMC Software responsible for the BMC Database Solutions for IMS. As product manager, Dave works with customers to understand their needs and uses that information to set product directions and prioritize new product capabilities as he interfaces with the development teams. Dave has over 30 years of experience with mainframe systems and has been in product management for over 20 years.