Tomium Software z/OS

Tomium Activity Monitor for IMS Modernization Guide

IMSMonitorSecurity

Tomium Activity Monitor for IMS is a ims product by Tomium Software. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Tomium Activity Monitor for IMS is a monitoring and security tool set designed for z/OS environments running IMS.

It helps detect and respond to security threats in real-time, meet regulatory requirements for auditing, and improve visibility into IMS transactions.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does Tomium Activity Monitor for IMS do?

Tomium Activity Monitor for IMS provides real-time auditing of IMS activity on z/OS systems. It acts as a monitor, capturing and forwarding events to other security solutions for analysis and reporting. This allows organizations to gain visibility into IMS transactions and identify potential security threats or compliance violations.

Is this a system, application, or tool?

Tomium Activity Monitor for IMS is best described as a monitoring and security tool set. It provides the tools necessary to capture, analyze, and forward IMS activity data to other security information and event management (SIEM) systems. It enhances the security posture of IMS environments.

What types of organizations use this?

Organizations that rely on IMS for critical business applications and require real-time auditing and security monitoring are ideal users. This includes large enterprises in industries such as banking, finance, insurance, and government. Any organization subject to compliance regulations requiring detailed audit trails of IMS activity would benefit.

When should we consider Tomium Activity Monitor for IMS?

A company should consider Tomium Activity Monitor for IMS when they need to enhance the security and compliance of their IMS environment. This includes situations where they need to detect and respond to security threats in real-time, meet regulatory requirements for auditing, or improve visibility into IMS transactions.

What are the alternatives to Tomium Activity Monitor for IMS?

Alternatives to Tomium Activity Monitor for IMS include other database activity monitoring (DAM) solutions and mainframe security products. Examples include Imperva SecureSphere, IBM Security Guardium, and McAfee Database Activity Monitoring. These products offer similar capabilities for auditing and monitoring database activity, but may have different features or integration options.

Technical

What infrastructure is required?

Tomium Activity Monitor for IMS requires a z/OS environment with IMS installed. It operates within an LPAR and integrates with existing IMS subsystems. It also requires connectivity to the security solutions to which it forwards events, such as SIEM platforms or database activity monitoring systems.

For mainframe products: Does this run in an LPAR?

Yes, Tomium Activity Monitor for IMS runs in an LPAR on z/OS. It is dependent on the z/OS operating system and integrates directly with IMS subsystems to capture activity data. It leverages z/OS security features for authentication and authorization.

Does this extend or enhance another product?

Tomium Activity Monitor for IMS enhances existing IMS systems by providing real-time auditing and monitoring capabilities. It does not replace IMS, but rather extends its functionality to improve security and compliance. It integrates with IMS to capture activity data and forward it to other security solutions.

How is this product typically deployed?

Tomium Activity Monitor for IMS is typically deployed on-premise, within the organization's z/OS environment. It requires technical expertise to install, configure, and maintain. Ongoing operational requirements include monitoring the system for performance and security issues, as well as maintaining connectivity to other security solutions.

Business Value

How does this product help with compliance?

Tomium Activity Monitor for IMS helps organizations meet compliance requirements by providing detailed audit trails of IMS activity. This allows them to demonstrate adherence to regulations such as PCI DSS, HIPAA, and GDPR. It also improves security by detecting and responding to threats in real-time.

What happens if we do not use this product?

Without Tomium Activity Monitor for IMS, organizations may lack visibility into IMS transactions and be unable to detect security threats or compliance violations in real-time. This can lead to increased risk of data breaches, regulatory fines, and reputational damage. Manual auditing processes may be time-consuming and ineffective.

What is the licensing model and TCO?

The licensing model for Tomium Activity Monitor for IMS is typically perpetual or subscription-based. The total cost of ownership includes the cost of the software license, implementation services, and ongoing maintenance and support. Vendor lock-in considerations may exist depending on the specific features and integration options used.

Security

What security features are included?

Tomium Activity Monitor for IMS supports various authentication methods, including RACF, ACF2, and Top Secret. It uses a role-based access control (RBAC) model to control access to its features and data. Encryption is used to protect sensitive data both in transit and at rest. Audit logging capabilities provide a detailed record of all user activity.

How does this integrate with other security tools?

Tomium Activity Monitor for IMS integrates with other security solutions, such as SIEM platforms and database activity monitoring (DAM) systems. This allows organizations to correlate IMS activity data with other security events and gain a more comprehensive view of their security posture. It forwards events to solutions like Imperva SecureSphere, AppSec DBProtect, or McAfee Database Activity Monitoring.

What audit/logging capabilities exist?

Tomium Activity Monitor for IMS provides audit logging capabilities that track all user activity and system events. This information can be used to investigate security incidents, identify potential compliance violations, and improve the overall security posture of the IMS environment. Logs can be exported to SIEM systems for further analysis.

Operations

What are common implementation challenges?

Implementing Tomium Activity Monitor for IMS requires technical expertise in z/OS, IMS, and security. Common implementation challenges include configuring the system to capture the desired activity data, integrating with other security solutions, and ensuring that the system does not impact the performance of IMS applications. Proper planning and testing are essential.

What are the ongoing operational requirements?

Ongoing operational requirements for Tomium Activity Monitor for IMS include monitoring the system for performance and security issues, maintaining connectivity to other security solutions, and applying software updates and patches. Regular review of audit logs is also important to identify potential security threats or compliance violations.

What administrative interfaces are available?

Administrative interfaces for Tomium Activity Monitor for IMS typically include a command-line interface (CLI) and a web-based console. The CLI is used for configuring the system and performing administrative tasks, while the web console provides a user-friendly interface for monitoring activity data and generating reports. User management is handled through z/OS security systems.

Ready to Start Your Migration?

Download our comprehensive migration guide for Tomium Activity Monitor for IMS or calculate your ROI.

Calculate ROI