Mainframe more secure than other systems

80% of retail organizations rely only on log-files to detect insider threats on the mainframe, exposing themselves to data breaches.

  • 6 years ago Posted in
Compuware Corporation has released a survey of retail CIOs showing that while most (71%) say their mainframe is more secure than other systems, the majority (87%) say they are still exposed to a significant risk of insider threats due to blind-spots in internal data access and controls.
 
The survey was conducted by independent research company Vanson Bourne, and administered in April to 400 CIOs at large companies (including 55 respondents from the retail industry) covering a cross-section of vertical markets in France, Germany, Italy, Spain, the UK and the U.S. Key findings include:
 
  • 59% of retail organizations use the mainframe as a core repository of their most sensitive data, storing either more or equal amounts of customers’ Personally Identifiable Information (PII) there as they do on other systems.
  • 71% of retail organizations said their mainframe is more secure than other systems, with a further 25% saying it was equally as secure, underscoring why their most sensitive data is stored on the mainframe.
  • 87% of retail organizations said they have a “blind spot” concerning what mainframe data is being accessed and how it’s being used.
  • 88% also find it difficult to track who has accessed data stored on the mainframe, exposing them to an increased risk of insider threats.
“The mainframe has always been the most securable platform in the enterprise; which is why organizations continue to entrust their most sensitive data to it,” said John Crossno, product manager, Compuware. “However, businesses still face the risk that privileged employees, or those who have acquired access illegally, will misuse mainframe data. Organizations must take steps to gain more visibility over who is accessing data and how they are using it.”
 
The research further revealed that the most common measures being used to overcome insider security risks include:
 
  • Saving security log files for future reference (80%)
  • Regularly scanning security logs for inconsistencies (55%)
  • Using a SIEM system to perform security analytics using mainframe data (55%)
  • Using a SIEM system to combine mainframe data with security data from other systems (53%)
 
However, no retail organizations monitor user and database activity to tackle insider threats on the mainframe.
 
“Most enterprises rely solely on disparate logs and SMF data from security products such as RACF to piece together user behaviour,” added Crossno. “Even those who are integrating that data into their SIEM aren’t getting the level of insight needed to identify a malicious insider. Organizations need deep insight into what data was viewed, by whom and which applications were used to access it. This can only be achieved by directly capturing complete, start-to- finish user session activity data in real time, and integrating it into a SIEM platform such as Splunk for deep analysis.”
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...