Z/OS V14 March 2012. Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE,

Slides:



Advertisements
Similar presentations
Chapter 20 Oracle Secure Backup.
Advertisements

SNMP v3.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Chapter 5 Data Management. – The Best & Most Convenient Way to Learn Salesforce.com 2 Objectives By the end of the module, you.
The RIGHT DATA at the RIGHT TIME in the RIGHT PLACE Data Stream Processor Introduction.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
Lesson 18: Configuring Application Restriction Policies
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
CCNA 2 v3.1 Module 2.
Operating Systems.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
A complete solution for archiving Domino mails using one Server task for hundreds of Notes users A. Kogan EDV Ltd. & Co. KG
Click to add text SAP XBP 3.0 exploitation TWS Education + Training.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
© 2012 IBM Corporation Tivoli Workload Automation Informatica Power Center.
Larry Mead Microsoft Corp. Jon Flanders Session Code: INT203.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
Copyright © 2006, SAS Institute Inc. All rights reserved. Enterprise Guide 4.2 : A Primer SHRUG : Spring 2010 Presented by: Josée Ranger-Lacroix SAS Institute.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
® IBM Software Group © 2012 IBM Corporation OPTIM Data Studio – Jon Sayles, IBM/Rational November, 2012.
Masud Hasan Secue VS Hushmail Project 2.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 Exploring Microsoft Office Word 2007 Chapter 7 The Advanced User Robert Grauer, Keith Mulbery,
Copyright 2007, Paradigm Publishing Inc. EXCEL 2007 Chapter 7 BACKNEXTEND 7-1 LINKS TO OBJECTIVES Record & run a macro Record & run a macro Save as a macro-
Week #7 Objectives: Secure Windows 7 Desktop
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
1. Chapter 25 Protecting and Preparing Documents.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
IBM ISPF Productivity Tool © 2008 IBM Corporation IBM ISPF Productivity Tool for z/OS V 5.10 More Than Just ISPF.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter 15: Electronic Mail Security
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
© 2013 Cisco System Inc. All rights reserved Cisco Confidential 1 © 2013 Cisco System Inc. All rights reserved. 1 System Backup And Restore Utility.
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
Computer Basics & Keyboarding. What Is A Computer? An electronic device operating under the control of instructions stored in its own memory unit An electronic.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 11 Understanding transaction managers on z/OS.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Digital Signatures and Digital Certificates Monil Adhikari.
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
Tool Integration with Data and Computation Grid “Grid Wizard 2”
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
HYPACK SHELL HYPACK Shell Features: Multiple maps, views and floating tool bars.
30 Copyright © 2009, Oracle. All rights reserved. Using Oracle Business Intelligence Delivers.
@toniblyx at #SummitNow Alfresco Backup and Recovery Tool: a real world backup solution November 2013 Toni de la Fuente – Alfresco Senior Solutions Engineer.
© 2015 IBM Corporation z13TLLB1 IBM zEnterprise Data Compression (zEDC)
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
A complete solution for archiving Domino mails using one Server task for hundreds of Notes users A. Kogan EDV Ltd. & Co. KG
19 Copyright © 2008, Oracle. All rights reserved. Security.
Import Cron and Windows Task Scheduler definitions
IPP Document Encryption Topics
Solutions for Linux on System z
Presentation transcript:

z/OS V14 March 2012

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. What’s Being Released? – z/OS  Release & Announce Date: 3/12/2012  PKZIP and SecureZIP for z/OS  SecureZIP Partner for z/OS

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. What’s New in v14  Create and Extract OpenPGP Files  zIIP Support  Command Substitution

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. OpenPGP Integration  Encrypt ZIP files using passphrase, x.509 digital certificates, and/or OpenPGP keys  Encrypt OpenPGP files using passphrase and/or OpenPGP keys  Sign ZIP files using x.509 digital certificates  Sign OpenPGP files with OpenPGP keys  Authenticate files signed with OpenPGP keys and x.509 digital certificates

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. OpenPGP Integration  Keys stored in file based pgp key rings Supports OpenPGP Contingency keys  Integrated with SecureZIP ISPF interface  New and modified commands  Native z/OS implementation, exploits hardware CPACF high speed encryption and hashing  Not FIPS 140 Compliant in OpenPGP mode

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. Levels of OpenPGP Function Edition OpenPGP Functionality* PKZIP SECreate OpenPGP format files NO encryption, NO decryption PKZIP EEDecrypt OpenPGP passphrases SecureZIP SEEncrypt & Decrypt OpenPGP passphrases Decrypt using OpenPGP keys SecureZIP EEEncrypt using OpenPGP Keys *OpenPGP function is incremental

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. SecureZIP Administration Panel

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. Main ZIP Panel – Pop-up “Archive File Format” pop-up has new value for PGPFILE format

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. New OpenPGP Commands/ Controls  New Commands -{PGPSET,attribute list} -{PGPKEYRDEF=ring_handle;PUB|PVT;FILE;filename}  Modified Commands -ARCHIVE_ZIPFORMAT=PGPFILE -RECIPIENT(PGP:ring_handle[,CN=| =|KEYID=|*ALL][,PASSWORD=]) -SIGN_ARCHIVE(PGP:ring_handle[,CN=| =|KEYID=][,PASSWORD=]) -ENCRYPTION_METHOD=CAST5 -AUTHCHK(ARCHIVE, PGP:ring_handle)  Security Server Resource Controls – New Values ENCRYPTION_METHOD.CAST5 CRYPTO_KEYTYPE.RECIPIENT.PGPKEYS

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. SecureZIP PartnerLink v14 Sponsor Partner PGP Partner For the Partner that insists on OpenPGP files, they don’t need SecureZIP Partner, they already have a tool to decrypt OpenPGP files

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. zIIP Specialty Engine Support  z Integrated Information Processor - zIIP Initially for DB2 Workload, now sort, compression, anything that can be scheduled in an enclave SRB Optional, chargeable IBM System z feature Offloads work from general CPs  Using zIIP’s can save customers money zIIPs do not affect the MSU’s (MIPS) Are less expensive than general processors

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. V14 Adds Support for zIIP  PKZIP and SecureZIP – All Editions  –ZIIP_RUNOPTS(Y|N) Controls whether qualified processing may be scheduled to execute on an active zIIP  Using zIIP requires that PKZIP/SecureZIP be APF enabled, or activated through the PKWSVC.

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. What does zIIP Support mean?  Work is MOVED from the general processor to the zIIP Doesn’t make it run faster Doesn’t use less total CPU Task processing time offloaded to enclave CPU  For faster processing with less CPU Consider using Hardware Compression feature

Copyright © 2012 PKWARE, Inc. and its licensors. All rights reserved. PKWARE, SecureZIP, and PKZIP are registered trademarks of PKWARE, Inc. Command Variable Substitution  Allows for command customization  Permits use of template command sets  Four types of substitutions Job related, e.g. Job name, Step name System related, e.g. SMF id and LPAR id Time/Date User defined