Session Evaluation

Using CICS security discovery to enforce Zero Trust and implement resource security.