O'Reilly logo

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite by Lili Xie, Jamie Pease, Deborah McLemore, Mark S. Hahn, Monique Conway, Michael Cairns, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IBM Security zSecure Alert
In this chapter, we introduce the features, architectures, and processing of zSecure Alert in detail. To help you better understand the zSecure Alert functions and use, we also provide implementation suggestions and integration guidelines about how to achieve effective security monitoring. We discuss a more detailed configuration scenario in Chapter 14, “Implementation phase II” on page 265.
This chapter covers the following topics:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required