Sparta logo

September 2021

SPARTA President’s Corner

contributed by Randy Springs

September traditionally marks the end of summer, the beginning of football season, and a transition period as we prepare for upcoming holidays and year-end activities. For me, personally, it will mean a transition to retirement after 47 years of full-time employment in Information Technology. I have been blessed with a career starting at UNC, with positions at GTE Data Services, SCM/Glidden, IBM, and BB&T (now Truist). I am looking forward to having free time to pursue new projects and pursuits.

This month, we will again be holding our SPARTA meetings via Zoom format. Due to the virtual format, we have suspended the dues requirement for 2021. Invite your fellow systems programmers to join us for networking and information.

For our August meeting, join us for a presentation from our own Ed Webb, retired from SAS, who will be sharing highlights from last month’s virtual SHARE conference, along with a time of networking with your fellow RTP area mainframers.

Please join your colleagues online at 7 p.m. on Tuesday, August 31 (a week early due to Labor Day), on Zoom. Watch for meeting connection information coming your way soon.

Randy Springs

Future Speakers

(subject to change)

August 31, 2021 (Special Date) - SHARE 2021 Summer Report by Ed Webb of SPARTA

October 5, 2021 - Cloud Proxy by Ron Hilton of Proximal Systems

November 2, 2021 - Tuning CICS PS by Ezriel Gross of Rocket Software

We need ideas and volunteers for future speakers. Presentations don’t have to be fancy, just informative and interesting. Even a 5 or 10 minute talk can start an interesting interaction. Contact Ron Pimblett by phone as noted below.

2020-2021 SPARTA

Board of Directors

Randy Springs - President

Truist                  (919) 745-5241

3200 Beechleaf Court, Suite 300

Raleigh, NC 27604

Ron Pimblett - Vice President

MDI Data Systems

Land line 613 599 6970

Mobile 613 981 6919

190 Guelph Private

Kanata, ON K2T 0J7

Chris Blackshire - Secretary

Retired (Dell, Perot Systems, Nortel)  (919) nnn-nnnn


Durham, NC 27713

Randy Springs - (Acting) Treasurer

Truist                  (919) 745-5241

see Randy

Springs earlier

Ed Webb -  Communications Director

Retired (SAS Institute Inc.)  (919) nnn-nnnn


Apex, NC 27523

Mike Lockey -  Web Master

Guilford Co. Information Services  336-641-6235

201 N. Eugene St.

Greensboro, NC 27401


Coronavirus Change: All meetings for the foreseeable future will be held online at 7 p.m. via the Zoom App. The link to meeting is sent to SPARTA Mailing list within 24 hours of the meeting time for security reasons. Stay safe.

Meetings are scheduled for the first Tuesday evening of each month (except no meeting in January), with optional dinner at 6:15 p.m. and the meeting beginning at 7:00 p.m.

These monthly meetings usually are held at LabCorp’s Center for Molecular Biology and Pathology (CMBP) near the Research Triangle Park (see last page). Take I-40 to Miami Boulevard and go north. Turn right onto T.W. Alexander Drive. Go about a mile or so. Then turn right into LabCorp complex and turn Left to the CMBP Building (1912 T.W. Alexander Drive). In the lobby, sign in as a visitor to see Bill Johnson. Bill will escort you to the conference room.

Call for Articles

If you have any ideas for speakers, presentations, newsletter articles, or are interested in taking part in a presentation, PLEASE contact one of the Board of Directors with your suggestions.

Newsletter e-Mailings

The SPARTA policy is to e-mail a monthly notice to our SPARTA-RTP Group. The newsletter is posted to the website about five (5) days before each meeting so you can prepare. The SPARTA-RTP Group is maintained by Chris Blackshire; if you have corrections or problems receiving your meeting notice, contact Chris at

March 2021 “CBT Tape” Shareware Online

The directory and files from the latest CBT tape V501 (dated March 4, 2021) are available from

If you need help obtaining one or more files, contact Ed Webb (see Board of Director’s list for contact info).

Minutes of the August 3, 2021 Meeting

• The meeting was called to order at 7:05 PM by Randy Springs, the SPARTA President.

• This sixteenth (April 2020 to August 2021) virtual SPARTA meeting was held via the Zoom Software.

• Twelve (12) people were present at the virtual meeting.

• The business portion of the meeting followed the presentation.

• For the Roundtable, everyone introduced themselves, told where they worked, talked about working from home, and briefly described their job functions and what they've been doing at work and home.


• The minutes of the June 29, 2021 meeting as published in the August 2021 Newsletter were approved.

• The July 31, 2021 Treasurer's report (no June income or expenses) as published in the August 2021 Newsletter was approved. As of July 31, 2021, the current balance was $1,489.66.

• Call For Articles: Articles are needed for this newsletter. If you would like to write an article for this newsletter, please contact Ed Webb. Keep in mind that you don't really need to write the article, it can be an article that you read that you would like to share with the membership.

• The SPARTA Web page is available. To access the SPARTA Web page, point your Web browser to this site: Please send any comments or suggestions about the Web page to Mike Lockey. Be sure to check the Web page every once in a while to see any new or changed information.

• 2021 meeting dates, Future Speakers and Topics (subject to change based on internal politics, budget, the weather):





August 31, 2021


Ed Webb

SHARE 137 Virtual Experience
Aug. 9-13, 2021

October 5, 2021

Proximal Systems

Ron Hilton

Cloud Proxy

November 2, 2021

Rocket Software

Ezriel Gross

Tuning CICS PS

December 7, 2021


Ed Addison

IBM z/OS Software

If you have suggestions about speakers and topics, contact Ron Pimblett.

• The next SPARTA monthly meeting will be held virtually on Tuesday, August 31, 2021.

• The 2021 dues have been suspended (motion passed in the March 2021 monthly meeting).

• Thanks to Duane Reaugh for online hosting the August 3 meeting via Zoom.

• There are currently 93 people on the SPARTA e-mail distribution list.

• Send any e-mail address changes to Chris Blackshire so he can update the SPARTA distribution List. The SPARTA meeting notices are being sent via a simple distribution list maintained by Chris.

• Randy Springs is looking for a new Treasurer volunteer. He projects about 2 hours per month is needed.
- Contact Randy Springs if you are interested.

• LabCorp Meeting Place Update: No update needed from Bill Johnson.


• In person meeting discussion (depending on vaccinations and room availability, probably Feb. 2022)

• The Business portion of the meeting ended about 8:55 P.M.

• Presentation Topic: Ensuring Mainframe Data is Safe in a World of Increasing Cyber Attacks

by Speakers from Dell Technologies.
• Monica Bennet, Corporate account sales
• Paul Scheuer, Mainframe Storage Marketing
• Carol Elstien, Principal Solutions Partner
• Gary Smoak, Mainframe division storage SE

The world under cyber attack – a mainframe perspective
Our Perspective (This is the most difficult time in history to protect the integrity of data)
But what does that have to do with the mainframe?
Protect and Restore Mainframe Data
Dell Mainframe Cyber Data Protection Technology
Advisory Services
Next Steps

• Presentation Access - See Below for a full outline of the presentation. See the SPARTA webpage for the complete presentation.

Contact Info:
Monica Bennett | Business Manager | Mainframe
Dell Technologies | Core Technologies
Cell: 617 694 5398

Visit our Web site: Dell Technologies Mainframe Storage

Paul Scheuer
Consultant Product Marketing Manager, Mainframe Storage
Dell Technologies | Storage & Data Protection Marketing
Cell: 520 661 6422

• This presentation ended about 8:42 P.M.
• The August 3, 2021 monthly meeting ended about 8:55 P.M.

Treasurer’s Report for August 2021

contributed by Randy Springs

The balance in the account is $1489.66 as of August 31, 2021.

SPARTA Financial Report
4/01/2021 through 08/31/2021


Opening Balance 4/1/2021


Total Deposits

Food money donated











Web Site


Petty Cash


Bank Service Charges






PETTY CASH on hand




Items of Interest

SPARTA Schedule and Menu for 2021

contributed by Chris Blackshire

Aug 31, 2021 (Special date) - Pizza (Labor Day holiday is Monday Sept 6)
Oct 5, 2021 - Chicken
Nov 2, 2021 - Subs
Dec 7, 2021 - BarBQ
Jan 4, 2022 - No meeting!

z/OS Links of Interest from Cheryl Watson

contributed By Ed Webb

Looking for information or tools about z/OS? Don't forget to check these sites mentioned in the most recent Tuning Letter from Watson and Walker.

IBM's well-known Hot Topics articles are at a new (more permanent, we hope) location at

When SHARE moved its website to a new platform, Marna's Musings moved as well. Her latest posting, Mission Possible: z/OS 2.5 ServerPac, Assignee: You, is here along with earlier ones you might have missed.

Lionel Dyck and his ISPF enthusiasts have created an ISPF tool to pull CBT Mods from the website directly to your mainframe. Sam Golob, the CBT Mods administrator, provided this info in a recent IBM-MAIN posting:
"There is now a new ISPF dialog which makes it much easier to find and download materials from the CBT Tape. The dialog is called CBTVIEW, and it can be found on File 043 of the Updates Page of the CBT Tape ( When this dialog is working, almost every suggestion on how to EASILY find and obtain a CBT File, which hadn't been implemented (until now), has been implemented. Searching and sorting is easy, getting the new updates is easy, and looking at the files is easy. The dialog also works for the CBT Overflow Tape, which alone has 315 additional files."

Past, Present and Future of the Mainframe with Open Source

contributed By Ed Webb

We just mentioned the CBT Tape in the previous article. Here's more about Open Source use on the Mainframe and how it will keep mainframes relavant into the future.

"Last spring, state governors from across the United States called for help with COBOL programmers. This desperate need for COBOL help showcased just how dependent we are on mainframes and how relevant they are. Many technologists today are less familiar with this architecture and ecosystem, but that is changing with open source becoming a core piece of the mainframe ecosystem.

What Is Old Is New

Ask someone who has been working with mainframes for some time, and they will tell you that the technology trends we see today have direct lineage to the mainframe. Virtualization? That was a feature in VM/370. Containerization? Concepts developed for mainframes and in production use as early as the 1970s. The list goes on and on. Even open source traces its root back to the mainframe. SHARE, which is the earliest computing user group, formed in 1955 in Los Angeles as a forum for users of a new piece of technology, the IBM 701 computer system. .... "

Read more about Open Source, SHARE, and the CBT Tape in this article by John Mertic in Enterprise Executive 2021: Issue 4.

IBM Announces the End of a Era

Contributed by Ed Webb

This week IBM announced the withdrawal and support discontinuance of these two iconic banking applications: IBM Check Processing Control System and IBM Item Capture System, effective December 31, 2023.

I haven't been involved with these check processing applications since 1980 but they were mainstay check handling applications for the banking industry for a couple of decades after that. Electronic banking including the mobile phone have dramatically reduced the use of physical checks for financial transactions. This announcement is a reminder that the world is changing even in the midst of, and maybe accelerated by, the pandemic.

Read the full, though sparse, IBM Withdrawal Announcement 921-110.


Funniest Signs Ever And The Puns Are Priceless

contributed by Chris Blackshire

Great Puns !! 

Take the short time to watch this well-done video on Youtube. It'll brighten your day!

Wit and Wisdom continued

contributed by Ed Webb

He who has no money is poor. He who has nothing but money is even poorer.
You must have long-range goals to keep you from being frustrated by short-range failures.
The best way to cheer yourself up is to cheer someone else up.

Experience is the name people give their mistakes.
Laziness is nothing more than resting before you get tired.
The difference between genius and stupidity is that genius has its limits.

Membership Information

Don’t Forget the Next SPARTA Meeting

Tuesday, August 31, 2021

7 p.m.

Location: Online

Information about access to our online meeting will be sent to our e-mail list by Tuesday, August 31.

Free Food before meeting: Your Food at Your Home


SHARE 2021 Summer Virtual Experience Report

Speaker: Ed Webb, a SHARE Volunteer

SPARTA Corporate Sponsors:

DTS Software

Rocket Software

Software Diversified Services


August 2021 Presentation outline

• Presentation Topic: Ensuring Mainframe Data is Safe in a World of Increasing Cyber Attacks

by Speakers from Dell Technologies.
• Monica Bennet, Corporate account sales
• Paul Scheuer, Mainframe Storage Marketing
• Carol Elstien, Principal Solutions Partner
• Gary Smoak, Mainframe division storage SE

The world under cyber attack – a mainframe perspective
Our Perspective (This is the most difficult time in history to protect the integrity of data)
But what does that have to do with the mainframe?
Protect and Restore Mainframe Data
Dell Mainframe Cyber Data Protection Technology
Advisory Services
Next Steps

Video: The world under cyber attack – a mainframe perspective

Cyber threats 2021: the facts
- Every 11 seconds a cyber or ransomware attacks occur. (Source: Cybersecurity Ventures)
- - 86% of breaches are financially motivated.
- - $24.7M Avg. cost of cybercrime for an organization.
- - $6T Total global impact of cyber crime in 2021.
- - 48% of breaches involved small business.
- Cybersecurity Cost Estimates
- - Banking $18.4M
- - Utilities $17.8M
- - Software $16.0M
- - Automotive $15.8M
- - Insurance $15.8M
- - High Tech $14.7M
- - Capital Markets $13.9M
- - Energy $13.8M
- - US Federal $13.7M
- - Consumer Goods $11.9M
- - Health $11.9M
- - Retail $11.4M
- - Life Sciences $10.9M
- - Media $ 9.2M
- - Travel $ 8.2M
- - Public Sector $ 7.9M

Why Should We Be Worried?
- Legacy skills shortages are opening the door to mainframe security risks, warns TmaxSoft - IT Security Guru
- It's all about the money
- It’s your data (in fact, it’s YOU in binary form)
- There are teams of people who make a fortune (millions) from stealing data and selling it
- And they have a marketplace to go and sell it!

The Dark Web – In A single Picture
- Exploring The Hidden Internet
- - Surface Web
- - - Google, Facebook, Twitter, etc
- - Deep Web
- - - Legal Documents
- - - Government Records
- - - Scientific Reports
- - - Academic Records
- - - Financial Records
- - Dark Web
- - - TOR Accessed
- - - Drugs
- - - Illegal Info

The value of YOU (your data) on the Dark Web!
- Demographic Data (worth $18 per person)
- - First Name, Last Name, Address, City, State, ZipCode, Phone #, Birth Date, SSN, Credit Card #
- Bank Details (worth $9 per account)
- Account #, Sort Code, Expiry Date, CVC

Look at what's happening!
(Pictures with text not copied)

What's is the wider security industry saying?
- Assume that the “Bad Actors” are already in your network
- Detection and Response are where we should be focusing?
- Ask yourself, could you really recover in the event of a Cyber/Ransomware Attack?
- Client Quote: “It’s OK I have all of my data replicated in 3 locations”
- We need to think more like a “Time Machine” solution that you see on Apple Mac’s

Our Perspective
- This is the most difficult time in history to protect the integrity of data.
- Dell EMC has been protecting the integrity of over 1/3 of the world’s most essential data for over 30 years.
- We invent and apply technology to ensure integrity of data; technology that as little as four years ago wasn’t even a thought.
- “69% of global IT decision-makers lack confidence their organizations could reliably recover all business-critical data in the event of a cyberattack.“

Modern Ransomware
- No longer just ‘fire and forget’
- - Larger coordinated efforts are now more common
- Three major stages of illegal capture of data:
- - 1. Access (Phishing campaign, social engineering, watering hole, vendor compromise, etc.)
- - 2. Discovery (what is available for us to steal/encrypt)
- - 3. Selling of the data (back to the owner!)
- - - Sell the decryption Key
- - - Sell copies of a company’s data or, for an additional fee, destroy (that sensitive) data

Online chat between CWT representative and hackers
(Pictures with text not copied)

Cyber Insurance
(Pictures with text not copied)

But what does that have to do with the mainframe?

Mainframe Security Myths!
- Mainframes have long been assumed secure:
- - Because: The mainframe was designed to be secure
- - Because: “Specialized skills” would be needed to compromise them
- - Because: It’s not public facing, it’s behind a firewall
- - Because: I don’t hear about mainframes being hacked in the news

Common Mainframe Attacks (from very private discussions)
- Password Spraying
- - Trying one password across every account
- Credential stuffing
- - Using known compromised username/passwords collected on one website and used / tried on others.
- But, that’s TOO NOISY
- - So, steal user credentials with a key logger

Mainframe Cyber Attack Target: storage infrastructure
Attackers exploit controls, then infiltrate storage which replicates the corruption
- How to hack a mainframe
- - 1. Install a keylogger via a phishing email to a Sys Admin.
- - 2. Sniff the network & find open ports or FTP-in
- - 3. Via a browser, send your malicious payload
- - 4. Malicious intent is replicated and 100% of storage is corrupted and, potentially ransomed
- Therefore, both online data and offline data, including backups, need more resiliency

What you will learn
- Data corruption, extortion and theft is real, the mainframe is not immune; obscurity does not ensure security; for many companies it’s a matter of when, not if
- Dell Technologies CR solution uses space efficient, secure snapshots for superior protection using less storage.
- Time To Protection (TTP) is shorter based on the ability to leverage existing Dell mainframe storage technology while implementing a seamless solution into an existing infrastructure.
- Time To Recovery (TTR) from a CR event is shorter based on the ability to leverage extremely fast Dell CR technology
- Dell Technologies Professional Services shortens the implementation timeframe while adding insight and value

Protect and restore mainframe data

NIST Cybersecurity Framework
- Identify
- Protect
- Detect
- Respond
- Recover

Cyber resiliency for mainframe –why?
Modern recovery plans MUST reduce the risk of data loss
- Historically, mainframe recovery had a DR focus: unavailability (system / site disasters)
- Modern threats: intentional data corruption or destruction; threats not immediately identified or understood
- Cyber Recovery protects data and provides for recovery from data disasters

Cyber Resilience is a Strategy | Cyber Recovery is a Solution
- Cyber Resilience
- - “The ability (for a business / organization) to continuously deliver the intended outcome despite adverse cyber events.” *
- - A high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions
- - Example: NIST Cybersecurity Framework
- Cyber Recovery
- - Cyber Recovery is a critical component of an overall Cyber Resilience strategy
- - Cyber Recovery is a data protection solution that isolates business-critical data away from attack surfaces
- - Critical data is stored immutably in a hardened vault enabling recovery with assured data availability, integrity and confidentiality

Dell Cyber Recovery Mainframe
- Immutability
- - A capability, not a solution
- - Data can’t be deleted or changed
- - No admin or security overrides
- - Single point of failure / platform dependence
- Isolation
- - Offline Copy
- - Air gap with isolation
- - Logical isolation – not just separate from production
- - Automation and control from secure side
- - Secure during “unlock” phase
- - Certification to a standard (Sheltered Harbor)
- Intelligence
- - Intelligent about how data is protected and recovered
- - Flexibility in data protection, retention and granularity
- - Answers the question: “Could this data be used for recovery?”
- - Resides and operates in the vault for security

Dell Technologies mainframe physical cyber vault
(Pictures with text not copied)

PowerProtect Cyber Recovery – Leveraging Data Domain as a Data Protection Platform
Dell Technologies Virtual Cyber Vault
Basic Cyber Resiliency Illustration: protect the data
Basic Cyber Resiliency Illustration: corruption event
Basic Cyber Recovery: restore the data

Dell Mainframe Cyber Data Protection Technology

Dell EMC addresses the mainframe storage challenges
- Simplify operation, reduce complexity; do more with less staff
- Increase storage capacity while meeting budgets
- Recover from cyber attacks & insider threats
- Ensure Z compatibility & performance for successful consolidations
- Ensure business continuity

SnapVX: Space Efficient Snapshots
- Each snapshot is ~ 99.9% smaller than the actual data it points to
- Simple to make and manage
- No performance impact
- Two flavors
- - “non-secured” for read-only continuous data protection while saving space
- - “Secure” for further protection against accidental or malicious deletion
- Dell EMC mainframe exclusive: “2nd copy NOT required” for restoration of data

zDP: The key to Mainframe Cyber Resiliency
- Automates SnapVX snapshot creation/deletion under z/OS
- Rapid recovery from
- - Processing error
- - Human error
- - Malicious intent
- Continual point in time copy creation
- - Granular (5 minutes)
- - Automated
- - Immutable
- - Selectable recovery points
- 2-actor security option

Dell EMC SnapVX / zDP logical protection
- Remote Replication
- - Short interval minimizes data loss
- - Enough to “discover” the corruption
- 10’s to 100’s of snapshots
- Minutes between snapshots
- Secure and non-secure
- Most current good copy*
- Oldest expires next

Traditional mainframe protection vs. SnapVX protection
- space savings + cyber resiliency
- Traditional
- - Required array capacity sized as 100% per clone
- - RPO = up to 24hrs* of data loss
- - Each clone (gold copy) creates a recovery point at the expense of 100% overhead!!
- PowerMax
- - Total required capacity = small % for each snap
- - Smallest RPO = 5 minutes
- - Up to 288 Gold copies / day (288 zDP Snaps Per day)
- - Up to 1024 gold copies per volume

Dell Technologies simplifies data restoration
- Good data is immediately available after the snap is selected
- Optionally, a “target volume” can be defined for “inspection” of restoration
- Required snap capacity ~40% additional capacity for up to 1,024 Point in time copies
- Selected timestamped snap has all pointers to data needed to restore
- 1 Step (instantly) + 40% of Production data (optionally check before restore)

Advisory Services

Why Dell Technologies for mainframe Cyber Resiliency and Recovery?
- zDP & SnapVX form the most robust, space efficient foundation for CR; the most protection in the least amount of space.
- Dell’s pointer-based CR use up to 6x Less reserve capacity than other implementations. (40% vs. up to 250%)
- Dell CR can create up to 12 inaccessible (non-addressable) protection points vs. a recommendation of a single point. (minimum RPO is based on a 5-minute interval snap vs. minimum RPO of one hour for other implementations.)
- Dell’s CR for DASD enables 1,024 snaps per volume vs. others.
- Dell Technologies single step CR snap recovery makes data immediately available vs. requiring 2 copies and 4 steps, including a mandatory fiber channel connection external to the storage being recovered.
- Dell’s exclusive use of z/OS System Authorization Facility(SAF) provides a “2-actor security” capability, preventing a single rogue or “company insider” from altering protection. Dell support is required to modify this setting.
- Dell Technologies CR implementation is flexible, offering both virtual and physical vault capability
- Dell Technologies Professional Services shortens the CR implementation time while adding insight and value.

Cyber Recovery Advisory & Implementation
- Finalize architecture options while implementing a foundational Cyber Recovery capability
- Project Kick-off and Definition
- - Identify and collect Cyber Security and BCDR background/collateral on potential applications.
- - Service Overview & Logistics
- - Service Tasks Schedule
- - Cyber Recovery Overview
- Technical Workshop
- - Discuss cyber vault architecture and operation to create cyber vault architecture, metrics, location and operation considerations
- - Cyber Recovery Architecture
- - Cyber Vault Considerations
- - High-Level Vault Design
- Critical Materials & Data Workshop
- - Identification of Critical Materials to target for initial implementation of Cyber Vault. Preliminary estimate on application data to be protected.
- - Cyber Vault Data Quantity and Copy Stream Recommendations
- - Vault Implementation Preparedness
- Infrastructure Configuration
- - Configure Cyber Recovery Vault Infrastructure, Hardening and Deploy air-gap copy and data immutability capability
- - Vault Configuration Documentation
- - Hardening Document
- - Air-Gap Copy, Policies & Immutability
- - Vault Restore Procedures
- Recovery Testing
- - Develop recovery test plan and conduct knowledge transfer of vault operations, security analytics and restore processes
- - Restore Test Plan & Report
- - Data Appropriate Security Analytics Techniques
- - Analytics & Operationalization Roadmaps

Case Study – Mainframe DASD & Tape
- Recover business critical systems associated with mainframe systems
- Challenges
- - Concerned about emerging CyberThreats and internal actors
- - Mainframe focused
- Solution
- Cyber Recovery Implementation
- - Customer moved to 4-site approach –SRDF-SQAR
- - Implemented zDP off the DR side of each site
- - - Every 10 min at one site
- - - Every day at a second site
- - 250 copies over 23,000 volumes and multiple frames
- Results
- - Developed a comprehensive solution enabling recovery of all mainframe data (DASD and DLm) to enable operations in the event of an extreme Cyber attack.
- - Demonstrated key functionality of a Cyber Recovery vault such as data immutability, process integrity and recovery.

Case Study – Heterogeneous Mainframe Environment
- Recover business critical systems associated with mainframe & open systems
- Challenges
- - Security is paramount for this customer, one of the world’s largest Banking and financial services institutions
- - The Bank identified 426 critical business and IT applications
- Strategy
- - Engaged an advisory firm to assess the market and identified the Dell Technologies cyber security solution as the solution
- - Start small and scale out
- - Implemented immediately using agile methodologies.
- Solution & Benefits
- - For open systems, implemented backup domains in the UK, Asia and the U.S. to provide a segregated vault.
- - For the mainframe, replaced the existing virtual tape environment in Asia and the U.S. with DLM8500, Data Domain to create efficient off network copies

Cyber Recovery Vault Example
(Pictures with text not copied)

Cyber recovery & data protection leadership
- #1 Data Protection Appliances & Software
- - Based on combined revenue from the IDC 3Q20 Purpose-Built Backup Appliance (PBBA) Tracker, with select Storage Software segments from the 3Q20 Storage Software and Cloud Services Qview.
- 900+ Cyber Recovery Customers (includes distributed and mainframe)
- 2015 First “Isolated” recovery solution with custom deployment
- 2016 zDP: 1st z/OS implementation of logical corruption protection
- 2018 Introduced PowerProtect Cyber Recovery solution
- 2019 First technology vendor in Sheltered Harbor Alliance Partner Program
- 2020 First Endorsed Sheltered Harbor Solution – PowerProtect Cyber Recovery
- 2021 Introduced PowerProtect Cyber Recovery for Multi-Cloud
- 2021 Introduced PowerProtect Cyber Recovery for AWS

Next Steps

Next step: Interactive Discovery Session
- Please share the story (in less than 24 minutes!): YouTube Dell Mainframe Cyber
- - The shortened presentation version ( )
- Assess the current Tape and DASD Environment
- CR Design Considerations
- - Review topology
- - Cyber Recovery vault (physical / virtual / both)
- - - Air gap considerations
- - Secure copy requirements
- - Required monitoring
- - Recovery process
- Cyber Resiliency & Recovery Expectations
- - Recovery Point Objective
- - Recovery Time Objective
- CR Testing
- - Frequency, personnel, certification
- Define Success Criteria

The virtual presentation ended about 8:42 P.M. followed by the business meeting.