
BMC AMI Enterprise Connector for IllumioBMC
Bring the mainframe into enterprise Zero Trust with automatic micro-segmentation
Vendor
BMC
Company Website
533530.pdf
Product details
BMC AMI Enterprise Connector for Illumio provides an interface between the Illumio Core and the IBM Z series to enable integrated service visibility and micro-segmentation across mainframe and distributed systems.
A two-way translator between Illumio and the mainframe to extend the benefits of Zero Trust to the mainframe—automatically.
- Two-way translation enables Illumio to collect network data from the mainframe and implement a wide range of Access Control Lists (ACLs) for network security policies
- Micro-segmentation improves breach containment by preventing unauthorized lateral movement to reduce the blast radius
- Micro-perimeters around specific assets break up the attack surface and allow granular control to contain breaches
- Encrypted communications within and across applications helps organizations meet compliance requirements, including PCI DSS, HIPAA, and SOX without re-architecting the network
- Communication with Illumio application dependency mapping provides real-time visibility of applications, workloads, and flows to understand risk and build more effective micro-segmentation policies
- Illumio application dependency mapping combined with built-in third-party vulnerability scan data helps close the window between the discovery and patching of vulnerabilities
Holistic Zero Trust visibility and control
Executive: Bring Zero Trust to your mainframe.
- Automated blocking extends your existing security strategy and toolset for distributed systems to the mainframe with no added work
- Micro-segmentation and micro-perimeters limit the impact of breaches and prevent known and unknown threats from spreading through the network
- Zero Trust principles and encryption for data-in-transit support and simplify regulatory compliance
Practitioner: Gain holistic visibility and control across platforms.
- Mainframe-inclusive application dependency maps provide insight to create targeted, cross-platform Zero Trust policies
- Continuous cross-platform visibility and insights into traffic across servers, applications, devices, and geographies aid early detection and response for known and unknown threats
- Fine-grained Zero Trust segmentation down to the application and workload level makes it easier to identify and block potential pathways of attack
- Incident containment capabilities helps you proactively and reactively contain ransomware by identifying and closing risky pathways and ports