SPARTA News
September 2021
SPARTA President’s Corner
contributed by Randy Springs
September traditionally marks the end of summer, the beginning of football season, and a transition period as we prepare for upcoming holidays and year-end activities. For me, personally, it will mean a transition to retirement after 47 years of full-time employment in Information Technology. I have been blessed with a career starting at UNC, with positions at GTE Data Services, SCM/Glidden, IBM, and BB&T (now Truist). I am looking forward to having free time to pursue new projects and pursuits.
This month, we will again be holding our SPARTA meetings via Zoom format. Due to the virtual format, we have suspended the dues requirement for 2021. Invite your fellow systems programmers to join us for networking and information.
For our August meeting, join us for a presentation from our own Ed Webb, retired from SAS, who will be sharing highlights from last month’s virtual SHARE conference, along with a time of networking with your fellow RTP area mainframers.
Please join your colleagues online at 7 p.m. on Tuesday, August 31 (a week early due to Labor Day), on Zoom. Watch for meeting connection information coming your way soon.
Randy Springs
Truist
Future Speakers
(subject to change)
August 31, 2021 (Special Date) - SHARE 2021 Summer Report by Ed Webb of SPARTA
October 5, 2021 - Cloud Proxy by Ron Hilton of Proximal Systems
November 2, 2021 - Tuning CICS PS by Ezriel Gross of Rocket Software
We need ideas and volunteers for future speakers. Presentations don’t have to be fancy, just informative and interesting. Even a 5 or 10 minute talk can start an interesting interaction. Contact Ron Pimblett by phone as noted below.
2020-2021 SPARTA
Board of Directors
Randy Springs - President
Truist (919) 745-5241
3200 Beechleaf Court, Suite 300
Raleigh, NC 27604
Ron Pimblett - Vice President
MDI Data Systems
Land line 613 599 6970
Mobile 613 981 6919
190 Guelph Private
Kanata, ON K2T 0J7
Chris Blackshire - Secretary
Retired (Dell, Perot Systems, Nortel) (919) nnn-nnnn
street
Durham, NC 27713
Randy Springs - (Acting) Treasurer
Truist (919) 745-5241
see Randy
Springs earlier
Ed Webb - Communications Director
Retired (SAS Institute Inc.) (919) nnn-nnnn
street
Apex, NC 27523
Mike Lockey - Web Master
Guilford Co. Information Services 336-641-6235
201 N. Eugene St.
Greensboro, NC 27401
Meetings
Coronavirus Change: All meetings for the foreseeable future will be held online at 7 p.m. via the Zoom App. The link to meeting is sent to SPARTA Mailing list within 24 hours of the meeting time for security reasons. Stay safe.
Meetings are scheduled for the first Tuesday evening of each month (except no meeting in January), with optional dinner at 6:15 p.m. and the meeting beginning at 7:00 p.m.
These monthly meetings usually are held at
LabCorp’s Center for Molecular Biology and Pathology (CMBP) near
the Research Triangle Park (see last page). Take I-40 to Miami
Boulevard and go north. Turn right onto T.W. Alexander
Drive. Go about a mile or so. Then turn right into LabCorp
complex and turn Left to the CMBP Building (1912 T.W. Alexander Drive). In the lobby, sign
in as a visitor to see Bill Johnson. Bill will escort you to
the conference room.
Call for Articles
If you have any ideas for speakers,
presentations, newsletter articles, or are interested in taking
part in a presentation, PLEASE contact one of the Board of
Directors with your suggestions.
Newsletter e-Mailings
The SPARTA policy is to e-mail a monthly notice to our SPARTA-RTP Group. The newsletter is posted to the website about five (5) days before each meeting so you can prepare. The SPARTA-RTP Group is maintained by Chris Blackshire; if you have corrections or problems receiving your meeting notice, contact Chris at chrisbl@nc.rr.com.
March 2021 “CBT Tape” Shareware Online
The directory and files from the latest CBT tape
V501 (dated March 4, 2021) are available from www.cbttape.org.
If you need help obtaining one or more files,
contact Ed Webb (see Board of Director’s list for contact
info).
Minutes of the August 3, 2021 Meeting
• The meeting was called to order at 7:05 PM by Randy Springs, the SPARTA President.
• This sixteenth (April 2020 to August 2021) virtual SPARTA meeting was held via the Zoom Software.
• Twelve (12) people were present at the virtual meeting.
• The business portion of the meeting followed the presentation.
• For the Roundtable, everyone introduced themselves, told where they worked, talked about working from home, and briefly described their job functions and what they've been doing at work and home.
OLD BUSINESS
• The minutes of the June 29, 2021 meeting as published in the August 2021 Newsletter were approved.
• The July 31, 2021 Treasurer's report (no June income or expenses) as published in the August 2021 Newsletter was approved. As of July 31, 2021, the current balance was $1,489.66.
• Call For Articles: Articles are needed for this newsletter. If you would like to write an article for this newsletter, please contact Ed Webb. Keep in mind that you don't really need to write the article, it can be an article that you read that you would like to share with the membership.
• The SPARTA Web page is available. To access the SPARTA Web page, point your Web browser to this site: http://www.spartanc.org. Please send any comments or suggestions about the Web page to Mike Lockey. Be sure to check the Web page every once in a while to see any new or changed information.
• 2021 meeting dates, Future Speakers and Topics (subject to change based on internal politics, budget, the weather):
Date |
Company |
Speaker |
Topic |
August 31, 2021 |
Retired |
Ed Webb |
SHARE 137 Virtual Experience |
October 5, 2021 |
Proximal Systems |
Ron Hilton |
Cloud Proxy |
November 2, 2021 |
Rocket Software |
Ezriel Gross |
Tuning CICS PS |
December 7, 2021 |
IBM |
Ed Addison |
IBM z/OS Software |
If you have suggestions about speakers and topics, contact Ron Pimblett.
• The next SPARTA monthly meeting will be held virtually on Tuesday, August 31, 2021.
• The 2021 dues have been suspended (motion passed in the March 2021 monthly meeting).
• Thanks to Duane Reaugh for online hosting the August 3 meeting via Zoom.
• There are currently 93 people on the SPARTA e-mail distribution list.
• Send any e-mail address changes to Chris
Blackshire so he can update the SPARTA distribution List. The SPARTA meeting notices are being sent via a simple distribution list maintained by Chris.
• Randy Springs is looking for a new Treasurer volunteer. He projects about 2 hours per month is needed.
- Contact Randy Springs if you are interested.
• LabCorp Meeting Place Update: No update needed from Bill Johnson.
NEW BUSINESS
• In person meeting discussion (depending on vaccinations and room availability, probably Feb. 2022)
• The Business portion of the meeting ended about 8:55 P.M.
• Presentation Topic: Ensuring Mainframe Data is Safe in a World of Increasing Cyber Attacks
by Speakers from Dell Technologies.
• Monica Bennet, Corporate account sales monica.bennett@dell.com
• Paul Scheuer, Mainframe Storage Marketing paul.scheuer@dell.com
• Carol Elstien, Principal Solutions Partner carol.elstien@dell.com
• Gary Smoak, Mainframe division storage SE gary.smoak@dell.com
AGENDA
• The world under cyber attack – a mainframe perspective
• Our Perspective (This is the most difficult time in history to protect the integrity of data)
• But what does that have to do with the mainframe?
• Protect and Restore Mainframe Data
• Dell Mainframe Cyber Data Protection Technology
• Advisory Services
• Next Steps
• Presentation Access - See Below for a full outline of the presentation.
See the SPARTA webpage for the complete presentation.
•
Contact Info:
Monica Bennett | Business Manager | Mainframe
Dell Technologies | Core Technologies
Cell: 617 694 5398
Email: monica.bennett@dell.com
Visit our Web site: Dell Technologies Mainframe Storage
Paul Scheuer
Consultant Product Marketing Manager, Mainframe Storage
Dell Technologies | Storage & Data Protection Marketing
Cell: 520 661 6422
Email: paul.scheuer@Dell.com
• This presentation ended about 8:42 P.M.
• The August 3, 2021 monthly meeting ended about 8:55 P.M.
Treasurer’s Report for August 2021
contributed by Randy Springs
The balance in the account is $1489.66 as of August 31, 2021.
SPARTA Financial Report
4/01/2021 through 08/31/2021
INCOME |
|
Opening Balance 4/1/2021 |
$1489.66 |
Total Deposits |
|
Food money donated |
0.00 |
Dues |
0.00 |
Sponsorships |
0.00 |
TOTAL INCOME |
$0.00 |
|
|
EXPENSES |
|
Food |
0.00 |
Web Site |
0.00 |
Petty Cash |
0.00 |
Bank Service Charges |
0.00 |
TOTAL EXPENSE |
$0.00 |
|
|
BANK BALANCE |
1121.95 |
PETTY CASH on hand |
367.71 |
TOTAL CASH |
$1489.66 |
Items of Interest
SPARTA Schedule and Menu for 2021
contributed by Chris Blackshire
Aug 31, 2021 (Special date) - Pizza (Labor Day holiday is Monday Sept 6)
Oct 5, 2021 - Chicken
Nov 2, 2021 - Subs
Dec 7, 2021 - BarBQ
Jan 4, 2022 - No meeting!
z/OS Links of Interest from Cheryl Watson
contributed By Ed Webb
Looking for information or tools about z/OS? Don't forget to check these sites mentioned in the most recent Tuning Letter from Watson and Walker.
IBM's well-known Hot Topics articles are at a new (more permanent, we hope) location at https://zos-hot-topics.com.
When SHARE moved its website to a new platform, Marna's Musings moved as well. Her latest posting, Mission Possible: z/OS 2.5 ServerPac, Assignee: You, is
here along with earlier ones you might have missed.
Lionel Dyck and his ISPF enthusiasts have created an ISPF tool to pull CBT Mods from the website directly to your mainframe. Sam Golob, the CBT Mods administrator, provided this info in a recent IBM-MAIN posting:
"There is now a new ISPF dialog which makes it much easier to find and download materials from the CBT Tape. The dialog is called CBTVIEW, and it can be found on File 043 of the Updates Page of the CBT Tape (https://www.cbttape.org/updates.htm).
When this dialog is working, almost every suggestion on how to EASILY find and obtain a CBT File, which hadn't been implemented (until now), has been implemented. Searching and sorting is easy, getting the new updates is easy, and looking at the files is easy. The dialog also works for the CBT Overflow Tape, which alone has 315 additional files."
Past, Present and Future of the Mainframe with Open Source
contributed By Ed Webb
We just mentioned the CBT Tape in the previous article. Here's more about Open Source use on the Mainframe and how it will keep mainframes relavant into the future.
"Last spring, state governors from across
the United States called for help with
COBOL programmers. This desperate
need for COBOL help showcased just
how dependent we are on mainframes and
how relevant they are. Many technologists
today are less familiar with this architecture
and ecosystem, but that is changing with
open source becoming a core piece of the
mainframe ecosystem.
What Is Old Is New
Ask someone who has been working with
mainframes for some time, and they will
tell you that the technology trends we see
today have direct lineage to the mainframe.
Virtualization? That was a feature in VM/370.
Containerization? Concepts developed for
mainframes and in production use as early as
the 1970s. The list goes on and on.
Even open source traces its root back
to the mainframe. SHARE, which is the
earliest computing user group, formed in
1955 in Los Angeles as a forum for users
of a new piece of technology, the IBM 701
computer system. ....
"
Read more about Open Source, SHARE, and the CBT Tape in
this article by John Mertic in Enterprise Executive 2021: Issue 4.
IBM Announces the End of a Era
Contributed by Ed Webb
This week IBM announced the withdrawal and support discontinuance of these two iconic banking applications: IBM Check Processing Control System and IBM Item Capture System, effective December 31, 2023.
I haven't been involved with these check processing applications since 1980 but they were mainstay check handling applications for the banking industry for a couple of decades after that. Electronic banking including the mobile phone have dramatically reduced the use of physical checks for financial transactions. This announcement is a reminder that the world is changing even in the midst of, and maybe accelerated by, the pandemic.
Read the full, though sparse, IBM Withdrawal Announcement 921-110.
Humor
Funniest Signs Ever And The Puns Are Priceless
contributed by Chris Blackshire
Great Puns !!
Take the short time to watch this well-done video on Youtube. It'll brighten your day!
Wit and Wisdom continued
contributed by Ed Webb
He who has no money is poor. He who has nothing but money is even poorer.
You must have long-range goals to keep you from being frustrated by short-range failures.
The best way to cheer yourself up is to cheer someone else up.
Experience is the name people give their mistakes.
Laziness is nothing more than resting before you get tired.
The difference between genius and stupidity is that genius has its limits.
Don’t Forget the Next SPARTA Meeting
Tuesday, August 31, 2021
7 p.m.
Location: Online
Information about access to our online meeting will be sent to our e-mail list by Tuesday, August 31.
Free Food before meeting: Your Food at Your Home
Program:
SHARE 2021 Summer Virtual Experience Report
Speaker: Ed Webb, a SHARE Volunteer
SPARTA Corporate Sponsors:
August 2021 Presentation outline
• Presentation Topic: Ensuring Mainframe Data is Safe in a World of Increasing Cyber Attacks
by Speakers from Dell Technologies.
• Monica Bennet, Corporate account sales monica.bennett@dell.com
• Paul Scheuer, Mainframe Storage Marketing paul.scheuer@dell.com
• Carol Elstien, Principal Solutions Partner carol.elstien@dell.com
• Gary Smoak, Mainframe division storage SE gary.smoak@dell.com
AGENDA
• The world under cyber attack – a mainframe perspective
• Our Perspective (This is the most difficult time in history to protect the integrity of data)
• But what does that have to do with the mainframe?
• Protect and Restore Mainframe Data
• Dell Mainframe Cyber Data Protection Technology
• Advisory Services
• Next Steps
• Video: The world under cyber attack – a mainframe perspective
• Cyber threats 2021: the facts
- Every 11 seconds a cyber or ransomware attacks occur. (Source: Cybersecurity Ventures)
- - 86% of breaches are financially motivated.
- - $24.7M Avg. cost of cybercrime for an organization.
- - $6T Total global impact of cyber crime in 2021.
- - 48% of breaches involved small business.
- Cybersecurity Cost Estimates
- - Banking $18.4M
- - Utilities $17.8M
- - Software $16.0M
- - Automotive $15.8M
- - Insurance $15.8M
- - High Tech $14.7M
- - Capital Markets $13.9M
- - Energy $13.8M
- - US Federal $13.7M
- - Consumer Goods $11.9M
- - Health $11.9M
- - Retail $11.4M
- - Life Sciences $10.9M
- - Media $ 9.2M
- - Travel $ 8.2M
- - Public Sector $ 7.9M
• Why Should We Be Worried?
- Legacy skills shortages are opening the door to mainframe security risks, warns TmaxSoft - IT Security Guru
- It's all about the money
- It’s your data (in fact, it’s YOU in binary form)
- There are teams of people who make a fortune (millions) from stealing data and selling it
- And they have a marketplace to go and sell it!
• The Dark Web – In A single Picture
- Exploring The Hidden Internet
- - Surface Web
- - - Google, Facebook, Twitter, etc
- - Deep Web
- - - Legal Documents
- - - Government Records
- - - Scientific Reports
- - - Academic Records
- - - Financial Records
- - Dark Web
- - - TOR Accessed
- - - Drugs
- - - Illegal Info
• The value of YOU (your data) on the Dark Web!
- Demographic Data (worth $18 per person)
- - First Name, Last Name, Address, City, State, ZipCode, Phone #, Birth Date, SSN, Credit Card #
- Bank Details (worth $9 per account)
- Account #, Sort Code, Expiry Date, CVC
• Look at what's happening!
(Pictures with text not copied)
• What's is the wider security industry saying?
- Assume that the “Bad Actors” are already in your network
- Detection and Response are where we should be focusing?
- Ask yourself, could you really recover in the event of a Cyber/Ransomware Attack?
- Client Quote: “It’s OK I have all of my data replicated in 3 locations”
- We need to think more like a “Time Machine” solution that you see on Apple Mac’s
• Our Perspective
- This is the most difficult time in history to protect the integrity of data.
- Dell EMC has been protecting the integrity of over 1/3 of the world’s most essential data for over 30 years.
- We invent and apply technology to ensure integrity of data; technology that as little as four years ago wasn’t even a thought.
- “69% of global IT decision-makers lack confidence their organizations could reliably recover all business-critical data in the event of a cyberattack.“
• Modern Ransomware
- No longer just ‘fire and forget’
- - Larger coordinated efforts are now more common
- Three major stages of illegal capture of data:
- - 1. Access (Phishing campaign, social engineering, watering hole, vendor compromise, etc.)
- - 2. Discovery (what is available for us to steal/encrypt)
- - 3. Selling of the data (back to the owner!)
- - - Sell the decryption Key
- - - Sell copies of a company’s data or, for an additional fee, destroy (that sensitive) data
• Online chat between CWT representative and hackers
(Pictures with text not copied)
• Cyber Insurance
(Pictures with text not copied)
• But what does that have to do with the mainframe?
• Mainframe Security Myths!
- Mainframes have long been assumed secure:
- - Because: The mainframe was designed to be secure
- - Because: “Specialized skills” would be needed to compromise them
- - Because: It’s not public facing, it’s behind a firewall
- - Because: I don’t hear about mainframes being hacked in the news
• Common Mainframe Attacks (from very private discussions)
- Password Spraying
- - Trying one password across every account
- Credential stuffing
- - Using known compromised username/passwords collected on one website and used / tried on others.
- But, that’s TOO NOISY
- - So, steal user credentials with a key logger
• Mainframe Cyber Attack Target: storage infrastructure
Attackers exploit controls, then infiltrate storage which replicates the corruption
- How to hack a mainframe
- - 1. Install a keylogger via a phishing email to a Sys Admin.
- - 2. Sniff the network & find open ports or FTP-in
- - 3. Via a browser, send your malicious payload
- - 4. Malicious intent is replicated and 100% of storage is corrupted and, potentially ransomed
- Therefore, both online data and offline data, including backups, need more resiliency
• What you will learn
- Data corruption, extortion and theft is real, the mainframe is not immune; obscurity
does not ensure security; for many companies it’s a matter of when, not if
- Dell Technologies CR solution uses space efficient, secure snapshots for superior
protection using less storage.
- Time To Protection (TTP) is shorter based on the ability to leverage existing Dell
mainframe storage technology while implementing a seamless solution into an
existing infrastructure.
- Time To Recovery (TTR) from a CR event is shorter based on the ability to leverage
extremely fast Dell CR technology
- Dell Technologies Professional Services shortens the implementation timeframe
while adding insight and value
• Protect and restore mainframe data
• NIST Cybersecurity Framework
- Identify
- Protect
- Detect
- Respond
- Recover
• Cyber resiliency for mainframe –why?
Modern recovery plans MUST reduce the risk of data loss
- Historically, mainframe recovery had a DR focus: unavailability (system / site disasters)
- Modern threats: intentional data corruption or destruction; threats not immediately identified or understood
- Cyber Recovery protects data and provides for recovery from data disasters
• Cyber Resilience is a Strategy | Cyber Recovery is a Solution
- Cyber Resilience
- - “The ability (for a business / organization) to continuously deliver the intended outcome despite adverse cyber events.” *
- - A high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and
technology solutions
- - Example: NIST Cybersecurity Framework
- Cyber Recovery
- - Cyber Recovery is a critical component of an overall Cyber Resilience strategy
- - Cyber Recovery is a data protection solution that isolates business-critical data away from attack surfaces
- - Critical data is stored immutably in a hardened vault enabling recovery with assured data availability, integrity and confidentiality
• Dell Cyber Recovery Mainframe
- Immutability
- - A capability, not a solution
- - Data can’t be deleted or changed
- - No admin or security overrides
- - Single point of failure / platform dependence
- Isolation
- - Offline Copy
- - Air gap with isolation
- - Logical isolation – not just separate from production
- - Automation and control from secure side
- - Secure during “unlock” phase
- - Certification to a standard (Sheltered Harbor)
- Intelligence
- - Intelligent about how data is protected and recovered
- - Flexibility in data protection, retention and granularity
- - Answers the question: “Could this data be used for recovery?”
- - Resides and operates in the vault for security
• Dell Technologies mainframe physical cyber vault
(Pictures with text not copied)
• PowerProtect Cyber Recovery – Leveraging Data Domain as a Data Protection Platform
• Dell Technologies Virtual Cyber Vault
• Basic Cyber Resiliency Illustration: protect the data
• Basic Cyber Resiliency Illustration: corruption event
• Basic Cyber Recovery: restore the data
• Dell Mainframe Cyber Data Protection Technology
• Dell EMC addresses the mainframe storage challenges
- Simplify operation, reduce complexity; do more with less staff
- Increase storage capacity while meeting budgets
- Recover from cyber attacks & insider threats
- Ensure Z compatibility & performance for successful consolidations
- Ensure business continuity
• SnapVX: Space Efficient Snapshots
- Each snapshot is ~ 99.9% smaller than the actual data it points to
- Simple to make and manage
- No performance impact
- Two flavors
- - “non-secured” for read-only continuous data protection while saving space
- - “Secure” for further protection against accidental or malicious deletion
- Dell EMC mainframe exclusive: “2nd copy NOT required” for restoration of data
• zDP: The key to Mainframe Cyber Resiliency
- Automates SnapVX snapshot creation/deletion under z/OS
- Rapid recovery from
- - Processing error
- - Human error
- - Malicious intent
- Continual point in time copy creation
- - Granular (5 minutes)
- - Automated
- - Immutable
- - Selectable recovery points
- 2-actor security option
• Dell EMC SnapVX / zDP logical protection
- Remote Replication
- - Short interval minimizes data loss
- - Enough to “discover” the corruption
- 10’s to 100’s of snapshots
- Minutes between snapshots
- Secure and non-secure
- Most current good copy*
- Oldest expires next
• Traditional mainframe protection vs. SnapVX protection
- space savings + cyber resiliency
- Traditional
- - Required array capacity sized as 100% per clone
- - RPO = up to 24hrs* of data loss
- - Each clone (gold copy) creates a recovery point at the expense of 100% overhead!!
- PowerMax
- - Total required capacity = small % for each snap
- - Smallest RPO = 5 minutes
- - Up to 288 Gold copies / day (288 zDP Snaps Per day)
- - Up to 1024 gold copies per volume
• Dell Technologies simplifies data restoration
- Good data is immediately available after the snap is selected
- Optionally, a “target volume” can be defined for “inspection” of restoration
- Required snap capacity ~40% additional capacity for up to 1,024 Point in time copies
- Selected timestamped snap has all pointers to data needed to restore
- 1 Step (instantly) + 40% of Production data (optionally check before restore)
• Advisory Services
• Why Dell Technologies for mainframe Cyber Resiliency and Recovery?
- zDP & SnapVX form the most robust, space efficient foundation for CR; the most protection in the least amount of space.
- Dell’s pointer-based CR use up to 6x Less reserve capacity than other implementations. (40% vs. up to 250%)
- Dell CR can create up to 12 inaccessible (non-addressable) protection points vs. a recommendation of a single point.
(minimum RPO is based on a 5-minute interval snap vs. minimum RPO of one hour for other implementations.)
- Dell’s CR for DASD enables 1,024 snaps per volume vs. others.
- Dell Technologies single step CR snap recovery makes data immediately available vs. requiring 2 copies and 4 steps,
including a mandatory fiber channel connection external to the storage being recovered.
- Dell’s exclusive use of z/OS System Authorization Facility(SAF) provides a “2-actor security” capability, preventing a single rogue or “company insider” from altering protection. Dell support is required to modify this setting.
- Dell Technologies CR implementation is flexible, offering both virtual and physical vault capability
- Dell Technologies Professional Services shortens the CR implementation time while adding insight and value.
• Cyber Recovery Advisory & Implementation
- Finalize architecture options while implementing a foundational Cyber Recovery capability
- Project Kick-off and Definition
- - Identify and collect Cyber Security and BCDR background/collateral on potential applications.
- - Service Overview & Logistics
- - Service Tasks Schedule
- - Cyber Recovery Overview
- Technical Workshop
- - Discuss cyber vault architecture and operation to create cyber vault architecture, metrics, location and operation
considerations
- - Cyber Recovery Architecture
- - Cyber Vault Considerations
- - High-Level Vault Design
- Critical Materials & Data Workshop
- - Identification of Critical Materials to target for initial implementation of Cyber Vault. Preliminary estimate on application data to be protected.
- - Cyber Vault Data Quantity and Copy Stream Recommendations
- - Vault Implementation Preparedness
- Infrastructure Configuration
- - Configure Cyber Recovery Vault Infrastructure, Hardening and Deploy air-gap copy and data immutability capability
- - Vault Configuration Documentation
- - Hardening Document
- - Air-Gap Copy, Policies & Immutability
- - Vault Restore Procedures
- Recovery Testing
- - Develop recovery test plan and conduct knowledge transfer of vault operations, security analytics and restore
processes
- - Restore Test Plan & Report
- - Data Appropriate Security Analytics Techniques
- - Analytics & Operationalization Roadmaps
• Case Study – Mainframe DASD & Tape
- Recover business critical systems associated with mainframe systems
- Challenges
- - Concerned about emerging CyberThreats and internal actors
- - Mainframe focused
- Solution
- Cyber Recovery Implementation
- - Customer moved to 4-site approach –SRDF-SQAR
- - Implemented zDP off the DR side of each site
- - - Every 10 min at one site
- - - Every day at a second site
- - 250 copies over 23,000 volumes and multiple frames
- Results
- - Developed a comprehensive solution enabling recovery of all mainframe data (DASD and DLm) to enable operations in the event of an extreme Cyber attack.
- - Demonstrated key functionality of a Cyber Recovery vault such as data immutability, process integrity and recovery.
• Case Study – Heterogeneous Mainframe Environment
- Recover business critical systems associated with mainframe & open systems
- Challenges
- - Security is paramount for this customer, one of the world’s largest Banking and financial services institutions
- - The Bank identified 426 critical business and IT applications
- Strategy
- - Engaged an advisory firm to assess the market and identified the Dell Technologies cyber security solution as the solution
- - Start small and scale out
- - Implemented immediately using agile methodologies.
- Solution & Benefits
- - For open systems, implemented backup domains in the UK, Asia and the U.S. to provide a segregated vault.
- - For the mainframe, replaced the existing virtual tape environment in Asia and the U.S. with DLM8500, Data Domain to create efficient off network copies
• Cyber Recovery Vault Example
(Pictures with text not copied)
• Cyber recovery & data protection leadership
- #1 Data Protection Appliances & Software
- - Based on combined revenue from the IDC 3Q20 Purpose-Built Backup Appliance (PBBA) Tracker, with select Storage Software segments from the 3Q20 Storage Software and Cloud Services Qview.
- 900+ Cyber Recovery Customers (includes distributed and mainframe)
- 2015 First “Isolated” recovery solution with custom deployment
- 2016 zDP: 1st z/OS implementation of logical corruption protection
- 2018 Introduced PowerProtect Cyber Recovery solution
- 2019 First technology vendor in Sheltered Harbor Alliance Partner Program
- 2020 First Endorsed Sheltered Harbor Solution – PowerProtect Cyber Recovery
- 2021 Introduced PowerProtect Cyber Recovery for Multi-Cloud
- 2021 Introduced PowerProtect Cyber Recovery for AWS
• Next Steps
• Next step: Interactive Discovery Session
- Please share the story (in less than 24 minutes!): YouTube Dell Mainframe Cyber
- - The shortened presentation version ( https://www.youtube.com/watch?v=g7jS-6BCdfU )
- Assess the current Tape and DASD Environment
- CR Design Considerations
- - Review topology
- - Cyber Recovery vault (physical / virtual / both)
- - - Air gap considerations
- - Secure copy requirements
- - Required monitoring
- - Recovery process
- Cyber Resiliency & Recovery Expectations
- - Recovery Point Objective
- - Recovery Time Objective
- CR Testing
- - Frequency, personnel, certification
- Define Success Criteria
The virtual presentation ended about 8:42 P.M. followed by the business meeting.