Date post: | 19-Jan-2017 |
Category: |
Technology |
Upload: | ca-technologies |
View: | 279 times |
Download: | 1 times |
Mary Ann Furno—Product Owner
Mainframe
CA Technologies
MFT28T
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive Data on the Mainframe
TechTalk
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Can you easily identify exactly what files are regulated or sensitive data on the mainframe? If not, stop by and listen to our experts show you how you can.
Mary Ann Furno
CA Technologies
Product Owner
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Product/Technology Architecture
Execution Policy
Web GUI Control ScansReporting
ClassificationEngine:
z/OSData Sources
VSAM
DB2
PS
API
3rd party 3rd party
CA ComplianceEvent Manager
PDS/PDSE
…
Description of Technology
Overview of Technology
CA Data Content Discovery “scans” data, identifying data vulnerabilities and risks to compliance.
Lands Lightly
Product has no other CA product dependencies or other prerequisites, installs in <1 day.
CA DCD Repository
I’d like to see all an aggregate list of all data sources that contain primary account numbers for scans that I ran in the past seven days.
CA Data Content Discovery
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect It
Prior to sending a dump data set, I’d like to scan to ensure it does not contain sensitive or regulated information.
CA Data Content Discovery
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Find It: Define Scope
Our remediation steps include finding out who has access to regulated or sensitive data and validating the access and access level.
CA Data Content Discovery
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect it: Who has access to the sensitive data?
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Protect it: Who has access to the sensitive data?
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Data Content Discovery Promise
FIND IT CLASSIFY IT PROTECT IT
For CISO, MF Security Director FOR CISO, Internal Audit, Risk OfficerFOR MF Security analysts, MF Data
analyst
The first data-pattern scanning
capability uniquely natively on
mainframe in the market
Simple and modern GUI along with
Flexible scheduling designed for
both z and non-IBM z personnel
Eliminate risky offloading- with data
security right on the mainframe.
Only data security product on the
market for mainframe to use
specialty engines to reduce upgrade
costs
Gain quick and critical insight about
the potential and magnitude of data
exposure on the mainframe.
Prove it to auditors that controls are
checked by data-types to satisfy
regulations.
Stay in control—eliminate risk while
reducing costs of data protection
processes.
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15