RSM Enterprise Solutions z/OS

realtimeDashboard Modernization Guide

SecurityAdministrationReport Generation and Management

realtimeDashboard is a security product by RSM Enterprise Solutions. Explore technical details, modernization strategies, and migration paths below.

Product Overview

realtimeDashboard is a security monitoring tool designed for z/OS environments.

Administrators can use the GUI to view security-related events and configure monitoring parameters.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is the primary purpose of realtimeDashboard?

realtimeDashboard provides a centralized view of security-related events and configurations across z/OS systems. It helps identify potential vulnerabilities, monitor user activity, and ensure compliance with security policies. The dashboard presents information in a user-friendly format, enabling administrators to quickly assess the security posture of their systems.

What specific security aspects does realtimeDashboard monitor?

realtimeDashboard monitors RACF configurations, dataset and resource rules, logon failure history, and potential issues in subsystems like CICS, DB2, and IMS. It provides insights into user access rights, data protection measures, and system-level security settings.

How is realtimeDashboard configured?

realtimeDashboard uses configuration files to define the scope of monitoring, specify thresholds for alerts, and customize the dashboard layout. The exact format and location of these files are detailed in the product documentation. The GUI provides an interface for modifying some configuration parameters.

Technical

What are the main components of the realtimeDashboard architecture?

realtimeDashboard's architecture includes a data collection component, a processing engine, a data storage repository, and a GUI dashboard. The data collection component gathers security events and configuration data from various z/OS subsystems. The processing engine analyzes the data and identifies potential security issues. The data storage repository stores the collected data and analysis results. The GUI dashboard presents the information to users.

What authentication and access control mechanisms does realtimeDashboard use?

realtimeDashboard supports authentication methods such as LDAP, Kerberos, and multi-factor authentication. Access control is managed through RBAC, allowing administrators to assign roles and permissions to users based on their responsibilities.

How does realtimeDashboard ensure data security?

realtimeDashboard uses encryption to protect sensitive data both in transit and at rest. Data transmitted between components is encrypted using TLS. Data stored in the repository can be encrypted using z/OS encryption facilities.

Does realtimeDashboard expose an API for integration with other systems?

realtimeDashboard provides a REST API for programmatic access to security data and configuration settings. The API allows developers to integrate realtimeDashboard with other security tools and automate security tasks. Specific API endpoints include /security_events, /configuration_settings, and /user_activity.

Business Value

How does realtimeDashboard provide business value?

realtimeDashboard helps organizations improve their security posture by providing a centralized view of security-related events and configurations. It enables administrators to quickly identify and address potential vulnerabilities, reducing the risk of security breaches and data loss. The dashboard also helps organizations comply with security regulations and industry standards.

How does realtimeDashboard improve operational efficiency?

By automating security monitoring and reporting, realtimeDashboard reduces the manual effort required to maintain a secure z/OS environment. This frees up security personnel to focus on more strategic tasks, such as threat analysis and incident response.

What audit and logging capabilities does realtimeDashboard offer?

realtimeDashboard provides detailed audit logs of all security-related events and user activity. These logs can be used to investigate security incidents, track user behavior, and demonstrate compliance with security policies. The logs can be exported in various formats for analysis by security information and event management (SIEM) systems.

Security

What security features does realtimeDashboard provide?

realtimeDashboard supports authentication methods such as LDAP, Kerberos, and multi-factor authentication. It uses RBAC to control access to security data and configuration settings. Encryption is used to protect sensitive data both in transit and at rest. Audit logs track all security-related events and user activity.

How does realtimeDashboard integrate with other security tools?

realtimeDashboard supports integration with SIEM systems, allowing organizations to correlate security events from z/OS with events from other systems. This provides a more comprehensive view of the security landscape and enables faster detection and response to security threats. The product supports standard protocols for SIEM integration, such as syslog and CEF.

What access control model is used in realtimeDashboard?

realtimeDashboard uses a role-based access control (RBAC) model. Administrators can define roles with specific permissions and assign users to those roles. This ensures that users only have access to the security data and configuration settings they need to perform their jobs.

Operations

What administrative interfaces are available in realtimeDashboard?

realtimeDashboard provides a web-based GUI for administrative tasks. User management is handled through the GUI, allowing administrators to create, modify, and delete user accounts. Configuration parameters can be modified through the GUI or by editing configuration files. Monitoring and logging capabilities are built into the product, providing real-time visibility into system activity and security events.

What reporting capabilities does realtimeDashboard offer?

realtimeDashboard generates detailed reports on security-related events and configurations. These reports can be used to track security trends, identify potential vulnerabilities, and demonstrate compliance with security policies. The reports can be generated on demand or scheduled to run automatically.

What are the network requirements for realtimeDashboard?

realtimeDashboard requires specific ports to be open for communication between its components. The GUI uses standard HTTP/HTTPS ports (80/443). The data collection component communicates with z/OS subsystems using their respective ports. The exact port requirements are documented in the product documentation.

Ready to Start Your Migration?

Download our comprehensive migration guide for realtimeDashboard or calculate your ROI.

Calculate ROI