UBM Tech Special Report

Enterprise Security & the Mainframe: A Holistic Approach

Issue link: http://dc.ubm-us.com/i/445427

Contents of this Issue

Navigation

Page 12 of 12

January 2015 UBM Tech 13 SSS today's attack strategies. They must address not only the dis- tributed systems and devices that enterprises and users know and love but also the mainframes at the core of sensitive data storage systems. In order to be effective, mainframe security must have the same goals and capabilities as the distributed systems with which they interact, and the security tools must integrate and work together across the enterprise. With a solid set of inte- grated mainframe security tools, businesses will be better posi- tioned to prevent and address the massive data breaches that have brought large retailers and, more recently, global banking institutions to their knees. p 1. Ponemon Institute, LLC, 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, May 2014. 2 . Arcati Limited, Arcati Mainframe Yearbook 2014, "The 2014 Mainframe User Survey," 2014. 3 . Verizon, 2014 Data Breach Investigations Report, 2014. 4 . Ponemon Institute, LLC. 5. Michael A. Davis, 2014 Strategic Security Survey, InformationWeek, May 2014 Effective Compliance Monitoring and SIEM About CA CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA Technologies is working with companies worldwide to change the way we live, transact, and communicate. CA Technologies software and solutions help our custom- ers drive enterprise-wide productivity, offer differentiated user experiences, and open new growth opportunities. And, we are able to deliver this value across multiple environments – mobile, private and public cloud, distributed, and mainframe. Our goal is to be recognized by our customers as their critical partner in the new application economy. For more information, please visit www.ca.com/mainframe. Click To Tweet

Articles in this issue

Links on this page

view archives of UBM Tech Special Report - Enterprise Security & the Mainframe: A Holistic Approach