Enterprise Research z/OS

CICS/View Modernization Guide

Tools and UtilitiesAdministrationCICS

CICS/View is a tools and utilities product by Enterprise Research. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CICS/View is a CICS session administration tool that allows administrators to monitor and manage user sessions.

It is particularly useful in environments where CICS is a critical part of the business, such as in banking, finance, and retail industries.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does CICS/View do?

CICS/View is a tool for managing CICS sessions. It allows administrators to monitor user activity, cancel sessions, view user screens, and send messages.

Is this a system, application, or tool?

CICS/View is a tool designed to enhance CICS administration. It provides features for managing user sessions and interacting with users directly.

What types of organizations use this?

Organizations that rely on CICS for transaction processing and need to manage user sessions effectively will benefit from CICS/View. This includes businesses in finance, retail, and other industries using mainframe systems.

When should we consider CICS/View?

Consider using CICS/View when you need to actively manage CICS user sessions, troubleshoot user issues, or communicate with users in real-time. It is particularly useful in environments with a large number of concurrent CICS users.

What are the alternatives to CICS/View?

Alternatives to CICS/View include other CICS session management tools or custom-built solutions. However, CICS/View provides a focused set of features for session monitoring and user interaction.

Technical

What infrastructure is required?

CICS/View requires a z/OS environment with CICS Transaction Server. It operates within an LPAR and relies on CICS subsystems for its functionality.

For mainframe products: Does this run in an LPAR?

CICS/View runs on z/OS within an LPAR. It is dependent on the CICS Transaction Server subsystem.

How is CICS/View administered and configured?

CICS/View likely uses a command-line interface (CLI) or a GUI-based interface for administration. Configuration files would store settings related to user access and monitoring parameters.

What happens if an organization does not use CICS/View?

Without CICS/View, organizations would need to rely on manual methods or other tools to manage CICS sessions, potentially leading to inefficiencies in problem resolution and user support.

Business Value

What is the business value of CICS/View?

CICS/View enhances operational efficiency by providing administrators with the ability to quickly monitor and manage CICS user sessions. This can reduce downtime and improve user satisfaction.

When should an organization consider buying CICS/View?

Organizations should consider purchasing CICS/View when they need a dedicated tool for managing CICS sessions and improving user support. It is a good fit for environments where CICS is a critical part of the business.

When is CICS/View not a good fit?

CICS/View may not be a good fit for organizations with very small CICS environments or those that do not require active session management.

Security

How does CICS/View handle security?

CICS/View likely integrates with existing security systems, such as RACF or ACF2, to authenticate users and control access to CICS resources. It uses the access control mechanisms provided by these systems.

What specific authentication methods are supported?

CICS/View likely supports authentication methods provided by the underlying z/OS security system, such as RACF or ACF2. The access control model is likely based on ACLs managed by the security system.

What audit/logging capabilities exist?

CICS/View likely provides audit logging capabilities to track user activity and administrative actions. These logs can be used for security monitoring and compliance purposes.

Operations

How is CICS/View typically deployed?

CICS/View is typically deployed on-premise within a z/OS environment. Implementation requires expertise in CICS and z/OS systems administration.

What ongoing operational requirements exist?

Ongoing operational requirements include monitoring CICS sessions, maintaining user access, and ensuring the availability of the CICS/View tool. This requires skilled CICS systems programmers.

What are common implementation challenges?

Common implementation challenges include integrating CICS/View with existing security systems and ensuring compatibility with different CICS versions.

Ready to Start Your Migration?

Download our comprehensive migration guide for CICS/View or calculate your ROI.

Calculate ROI