Custom Trainings
Learn from the IT Security and Compliance from Experts

Get well prepared and ready for your security and compliance missions.

We provide you with tailored education and training in the fields in which you have demands or challenges.


N
z/OS-related training (RACF, USS, etc.)
N

SF solution training

N

non-SF solution training (e.g. Splunk, etc.)

Contact us and tell us more about your demand and focus.

Location

This workshop is exclusively offered as an inhouse training. You must supply the room, beamer, overhead projector, flip chart, and access to the z/OS system.

Participants

z/OS system programming, RACF and Security Server administration, auditing, IT security, and the UNIX departments.

}

Time

1.5 up to 2 days.

Number of Participants

Up to 10 internal employees; external employees are not permitted.

Cost

Upon your request

Training Material

Included.

Are you interested in this leading know-how?

 

Please don't hesitate to contact us through our contact form below or by our worldwide toll-free phone number ++800-37333853 (++800-DRFEDTKE) 
or an e-mail to training@enterprise-it-security.com

Automate your IT Security and Compliance to the max today!

Trainings to the max.

Training Services

Our individualized training will make your teams strong and competent in all relevant fields. Just let us know your demands and we will prepare the required knowledge transfer for you.

News & IT Security Forum

SF-Sherlock filter to detect bypassing mandatory usage of Privileged Account Security solutions, such as CyberArk

Privileged Account Security solutions, such as CyberArk, became almost mandatory for larger data centers – definitely in case of critical infrastructures. They support your compliance by managing the passwords of your privileged users, recording their screen while working on given systems, and by strict policies it’s only allowed for privileged users to work when their sessions are recorded.

In case of mainframes, in order to comply with this regulation, the 3270 emulation session has to be established from specific servers for guaranteeing the required recording; the same is true for any session via PUTTY, FTP, etc. Accordingly it has to be detected, such as via the given SIEM solution, if someone tries to bypass this session recording obligation by connecting from outside the Privileged Account Security solution’s surveillance scope. For properly detecting any bypassing a corresponding monitoring is required on the mainframe.

All SF-Sherlock users may now participate in our latest experience to establish such a bypass detection. A set of specialized filters has been developed to select and forward all required details to your SIEM solution – almost spoon-ready for an easy filter and correlation definition.

SF-SafeDump supports XML and JSON files

SF-SafeDump’s new PTF level 021 supports high-quality anonymization of log files in the XML and JSON formats. This new feature supports mainframe data centers providing XML- and JSON-based diagnostic and debug information to their software vendors or internal development departments. Please ask our support to receive SF-SafeDump’s latest update.

Join our newsletter list

Worldwide toll-free phone number

++800 - 37 333 853
or simply dial:
++800 - DRFEDTKE

Alternatively:
+41 41 710 4005

(++ represents the prefix for international calls; in most countries it is 00; in the U.S. it corresponds to 011)

Find Us

Headquarters

Seestrasse 3a, 6300 Zug, Switzerland

Visitors & Training

Dammstrasse 19, 6301 Zug, Switzerland

Social Media

Xing → Linkedin →

Write Us

Marketing
marketing@enterprise-it-security.com
copy the address

Technical support and hotline
hotline@enterprise-it-security.com
copy the address

Legal and compliance
legal@enterprise-it-security.com
copy the address