¡A unique, world-wide service that provides continuous improvement in Compliance, Audit and security in z/OS environments to comply with the new European Union directives DORA and NIS2!

Compatible up to z/OS 3.1.
Most companies that use mainframe infrastructure to run their critical business processes believe that these terms do not apply to their zSeries mainframe systems:
- Ransomware
- Hacking
- Denial of Services
- Logic Bombs
- Trojans
- Backdoors
...
Do you still believe that you are safe from any serious incident? We invite you to review the main security incidents published in the last 25 years in this video
Incidents in Mainframe infrastructures for Managers and Auditors (subtitled in English)
Knowledge is Security!
How to get past regulatory compliance audits in Mainframe environments?.
In the previous video we have seen serious security incidents that could have been avoided by implementing Security Best Practices and auditing processes of the implemented controls
This video answers questions like
- Where is the audit information in these environments?
- Do the companies have sufficient capacity to perform their work with due diligence?
- What are the main regulations that require auditing in mainframe environments?
- Is there a concept of continuous auditing, or do we just settle for a sporadic audit every two or three years?
- How does a continuous audit framework in these systems help to reduce the corporate responsibility of the Board of Directors?
- .....
This is a necessary video to understand the challenges posed by mainframes in the face of regulatory compliance (NIS 2, PCI, SOLVENCY, BASEL, SOX, GDPR...) aimed at Management Personnel, Auditors and Regulatory Compliance Departments (subtitled in English soon).
Knowledge is Security!
Real case of hacking of a mainframe of 12 million euros and billions in data.
In the previous video we have seen serious security incidents that could have been avoided by implementing Security Best Practices and auditing processes of the implemented controls.
This video answers questions like:
- How to take advantage of the hacking information that exists on the Internet?
- How to set up a 400 euro laboratory to carry out the attack?
- Are your security controls as imaginative as the malicious users?
- What configuration errors do they take advantage of?
- How can you disable all the LPARs in the real data center and the alternate data center at the same time for days?
- And what is more important: How we can avoid it before they get it with our DataPASS service.
This video shows enough knowledge taken from the Internet and shows its application on a real environment (subtitled in English).
Seeing is believing!
Adaptable to any size Mainframe technology user