Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/15/2006
07:40 AM
50%
50%

IBM (Main)Frames Security

IBM claims a mainframe is the hottest platform for new storage and security software

Forty-two years after IBM introduced the mainframe computer to the world, the company maintains the platform is still relevant. Today, Big Blue took the wraps off a slew of new software products designed to manage storage and security from its System z mainframe.

The software, which was previewed at the SHARE user conference in Baltimore, includes a version of Tivoli's Federated Identity Manager designed specifically for the System z's z/OS operating system and Tivoli Omegamon XE, a system management tool based on technology from IBM's 2004 acquisition of Candle. (See Management Feeding Frenzy and IBM Holds a Candle.)

The Tivoli Federated Identity Manager runs under z/OS, unlike previous versions of the software, which ran under Linux, Windows, and the AIX operating system. According to Bob Madey, the software offers users a highly secure platform for checking end-user identities.

Omegamon XE, working in conjunction with another new software called Composite Application Manager, scans different operating systems, databases, and devices attached to the System z to check for problems. "They could easily identify if there is insufficient storage capacity that is causing a performance or availability problem," says Madey.

At least one analyst thinks IBM is right, that the robust mainframe is an ideal platform for this type of work, compared to say, a Windows system. "Z/OS is the most reliable and secure platform in the world. Get your security stuff inside the z/OS 'fence' and it is safe," says Phil Payne, principal at Sheffield, England-based Isham Research.

But Payne warns that, despite its advantages, the mainframe is under attack. "The question [for an IT manager] is convincing your CIO what the long-term prospects are for the platform," he warns, adding the mainframe is facing stiff competition from more cost-efficient server clusters built with AMD and Intel chips.

There is also a question mark over the mainframe's status amongst developers. "Modern code is being developed for RISC processors and Intel processors, not mainframes," says Payne. "There are thousands of times more developers working on Intel than the mainframe, so there are many more tools being developed there."

Data center managers’ organization AFCOM has already voiced its fears about the fact that the next-generation of IT managers are often mainframe-averse. The user group has even warned that the impending skills shortage could be as expensive as Y2K. (See Mainframe Skills Shortage Looms.)

IBM and SHARE, in an attempt to resolve this problem, have already announced plans to lure students and young IT professionals over to the mainframe. (See Mainframe Mid-Life Crisis and IBM Creates Community.)

That said, there are examples of organizations that have successfully centralized IT management on mainframes. Boston University, for example, relies on a single IBM z890 mainframe as the central server for all its student, faculty, and alumni data. (See CA Makes Mainframe Security Play.)

Farther south, an IT manager at a university in the southeastern U.S., who asked not to be named, told Byte and Switch that he is getting good levels of performance from his IBM mainframe. "It has been very solid for many decades," he explained.

But the exec added that he is unlikely to consider IBM's new Tivoli offerings. He explained that his university has built its own identity management system using Linux. The organization opted for open source, he adds, purely because it was cheaper than the likes of Tivoli.

Indeed, price could be a deciding factor in the success or failure or IBM's latest offerings. IBM isn't yet saying what it will charge for the new software, which is set to be available as part of the company's service oriented architecture (SOA) strategy before the end of the year. (See IBM Expands SOA , and IBM Unveils Software.)

Although IBM is the main supplier of mainframe systems at the moment, the vendor also faces competition from CA, an age-old rival in this space. (See Mainframe VTL Opens Up, CA Releases New Offerings, and CA Adds Tape Encryption.)

— James Rogers, Senior Editor, Byte and Switch

  • Advanced Micro Devices (NYSE: AMD)
  • CA Inc. (NYSE: CA)
  • IBM Corp. (NYSE: IBM)
  • IBM Tivoli
  • Intel Corp. (Nasdaq: INTC)

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 9/25/2020
    9 Tips to Prepare for the Future of Cloud & Network Security
    Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
    Vulnerability Disclosure Programs See Signups & Payouts Surge
    Kelly Sheridan, Staff Editor, Dark Reading,  9/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15216
    PUBLISHED: 2020-09-29
    In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
    CVE-2020-4607
    PUBLISHED: 2020-09-29
    IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
    CVE-2020-24565
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
    CVE-2020-25770
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
    CVE-2020-25771
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...