Logo
Sign in
Product Logo
BMC AMI Enterprise Connector for IllumioBMC

Bring the mainframe into enterprise Zero Trust with automatic micro-segmentation

Vendor

Vendor

BMC

Company Website

Company Website

533530.pdf
Product details

BMC AMI Enterprise Connector for Illumio provides an interface between the Illumio Core and the IBM Z series to enable integrated service visibility and micro-segmentation across mainframe and distributed systems.

A two-way translator between Illumio and the mainframe to extend the benefits of Zero Trust to the mainframe—automatically.

  • Two-way translation enables Illumio to collect network data from the mainframe and implement a wide range of Access Control Lists (ACLs) for network security policies
  • Micro-segmentation improves breach containment by preventing unauthorized lateral movement to reduce the blast radius
  • Micro-perimeters around specific assets break up the attack surface and allow granular control to contain breaches
  • Encrypted communications within and across applications helps organizations meet compliance requirements, including PCI DSS, HIPAA, and SOX without re-architecting the network
  • Communication with Illumio application dependency mapping provides real-time visibility of applications, workloads, and flows to understand risk and build more effective micro-segmentation policies
  • Illumio application dependency mapping combined with built-in third-party vulnerability scan data helps close the window between the discovery and patching of vulnerabilities

Holistic Zero Trust visibility and control

Executive: Bring Zero Trust to your mainframe.

  • Automated blocking extends your existing security strategy and toolset for distributed systems to the mainframe with no added work
  • Micro-segmentation and micro-perimeters limit the impact of breaches and prevent known and unknown threats from spreading through the network
  • Zero Trust principles and encryption for data-in-transit support and simplify regulatory compliance

Practitioner: Gain holistic visibility and control across platforms.

  • Mainframe-inclusive application dependency maps provide insight to create targeted, cross-platform Zero Trust policies
  • Continuous cross-platform visibility and insights into traffic across servers, applications, devices, and geographies aid early detection and response for known and unknown threats
  • Fine-grained Zero Trust segmentation down to the application and workload level makes it easier to identify and block potential pathways of attack
  • Incident containment capabilities helps you proactively and reactively contain ransomware by identifying and closing risky pathways and ports
Find more products by category
Security SoftwareView all