-
S102 - CICS TS - Security enhancments
CICS TS 6 introduces new security discovery tooling to easily adopt Zero Trust best practices, including role-based definitions in combination with CICS transaction, resource, and command security protection.
-
S104 - Implementing Resource Security in CICS with Security Discovery
For decades, boundary or perimeter security was seen to suffice within enterprise security. Not anymore - Zero Trust is here! CICS TS 6 introduces Security Discovery, a tooling with a purpose of building a picture of the users and security being used within your current environments. In this presentation we will show how Resource Security is integral to a Zero Trust security strategy within enterprise security and why Security Discovery is a necessity to getting your CICS environments conforming with it.