
Making the Mainframe Central to Your Data Fabric Strategy
How enterprises choose to manage their data will directly impact customer experience—and ultimately drive better business outcomes in the years to come.

Zero Trust, Part 5: Deeper Trust in Each and Every Identity
Tragic events can happen in the blink of an eye. When there are preventions that could’ve resulted in different outcomes, we often wish we could turn back the clock and go for a redo! In hindsight, prevention may seem so effortless that the lack of effort to implement the precaution seems nonsensical. Common examples are […]

Zero Trust, Part 4: How to Adopt Zero Trust for Mainframe
We have established that Zero Trust is an approach to security that can and should be applied to the Mainframe. Yet too often, Mainframe is overlooked as a security concern, as many assume that it is naturally secure, because, well, it’s a Mainframe. Now, this is certainly flattering for the platform, and to be honest, […]

Zero Trust, Part 3: Is Zero Trust Challenging to Adopt?
As described in a previous post, Zero Trust seems like an initiative that is more appropriate for a new system or application, but not something one would hope to achieve on a system that has been in use for decades. For example, Mainframe has years of use around it, a security strategy already in place, and […]

Major Health Insurance Fund Empowered by AIOps
As a major public, nonprofit health insurance fund, Socialistische Mutualiteiten (NVSM) knows well the mission-critical value of having a reliable, secure, and responsive IT system. This is one the reasons we had one of the first mainframe sites in Belgium. Today, 95% of our code and business logic reside on the mainframe. The requests come […]

Zero Trust, Part 2: The Benefits of Zero Trust
Zero Trust: trust no one. It seems basic, but also seems somewhat unachievable: If you trust no one, then no one has access to your systems or data. Assets will be secure for sure, but also unusable. In fact, so unusable that business will grind to a halt, effectively eliminating the need for data at […]

Zero Trust, Part 1: Making Sense of Security, Today’s Most Complicated Jigsaw Puzzle
Making Sense of Security, Today’s Most Complicated Jigsaw Puzzle Jigsaw puzzles come in many shapes, sizes, and complexities. But they all are completed in a similar way – viewing the end goal, determining a strategy, and implementing piece by piece. Similarly, IT environments come in varied architectures, sizes and complexities and may seem just as […]