Saturday, January 17, 2026

Project: Network Eye - Z os Data Traffic

 






Aimlux.ai Proposes:  Project: Network Eye  -  Improving z/OS cyber security by understanding data  traffic, with Packet Capture (PCAP) solutions. CyberSpatial Teleseer sees helps you with a novel approach that can produce Advanced Solutions for IBM z/OS Enterprise Class uses.  The core of TeleSeer, makes it a perfect fit to enhance, augment and authorize Financial Core (FinCore) Data Systems. Teleseer generates a digital twin of Mission Critical systems and is currently deployed across Apex Defense Users who require Zero Trust Architecture (ZTA). 


In the high-stakes environment of financial services, the combination of IBM z/OS and Cyberspatial Teleseer creates a powerful "defense-in-depth" architecture. This partnership bridges the gap between the mainframe’s internal "fortress" security and the external network’s complex, often opaque, traffic patterns.

__________________________________________________________________





1. TELESEER - The Power of the "Inside-Out" and "Outside-In" View

The core of this collaboration lies in how each platform handles data and visibility:

  • IBM z/OS (The Secure Core): Provides a "zero-trust" environment for financial transactions. With features like Pervasive Encryption and RACF (Resource Access Control Facility), z/OS ensures that even if data is intercepted, it is unreadable, and only authorized users can touch specific records.


  • Cyberspatial Teleseer (The Network Eye): While z/OS secures the data, Teleseer maps and visualizes the network "terrain" surrounding the mainframe. It uses 100% passive, agentless packet analysis to build a real-time digital twin of the network.

2. How They Work Together: Z and Teleseer- 


Financial services users benefit from a unified security posture where the mainframe is no longer a "black box" on the network map.


FeatureIBM z/OS ContributionCyberspatial Teleseer ContributionCombined Benefit
VisibilityGenerates detailed logs (SMF records) of internal system activity.Provides a 3D visual map of all devices communicating with the mainframe.Eliminates Blind Spots: Admins see exactly who is talking to the mainframe and what they are doing.
Threat DetectionUses AI-powered processors (Telum) to detect fraud at the transaction level.Uses behavioral analytics to spot unusual network traffic spikes or unauthorized lateral movement.Rapid Incident Response: Teams can correlate a transaction anomaly on z/OS with a specific network path identified in Teleseer.
Data IntegrityEncrypts data at rest and in transit using hardware-accelerated crypto.Validates that traffic is following expected, secure protocols (e.g., ensuring TLS 1.3 is active).Regulatory Compliance: Easily prove to auditors that financial data is both encrypted and traveling over validated paths.



3. Improving Cyber Resilience


For financial institutions, downtime is not an option. This combination enhances Cyber Resilience by:


  1. Mapping Mission-Relevant Terrain: Teleseer identifies "Key Terrain Cyber"—the critical switches and routers that the mainframe relies on.

  2. Validating Segmentation: It ensures that the "Air Gap" or logical separation between development and production financial environments is actually intact.

  3. Passive Monitoring: Because Teleseer is agentless, it adds zero "overhead" or risk of crashing sensitive mainframe applications, while still providing total situational awareness.




Next Steps

Explained -  how to integrate z/OS SMF logs into a visual analytics platform like Teleseer for deeper forensic analysis?

__________________________________________________________________________________


Cyberspatial Teleseer solutions present: a powerful way to bridge the gap between mainframe infrastructure and modern security visualization. Integrating z/OS SMF (System Management Facilities) logs into a platform like Teleseer allows you to transform raw, binary mainframe data into interactive network topologies and activity maps—crucial for hunting lateral movement or identifying unauthorized access.


The process generally involves three main phases: Extraction, Transformation, and Ingestion.


1. Extraction: Getting SMF Records off the Mainframe


Mainframe data is stored in a proprietary binary format (EBCDIC). You need to extract the relevant records—typically Type 80 (RACF/Security), Type 110 (CICS), or Type 119 (TCP/IP)—into a format that distributed systems can read.

  • Real-Time Streaming: Use tools like IBM Z Common Data Provider (CDP) or Syncsort Ironstream. These tools act as a "log forwarder" for z/OS, streaming SMF records directly to an external subscriber (like a Kafka cluster or a Linux server).

  • Batch Extraction: If you don't need real-time data, you can use the IBM utility IFASMFDP (or IFASMFDL for logstreams) to dump specific SMF records into a flat  file.



2. Transformation: EBCDIC to JSON/CSV


Teleseer and similar platforms cannot parse raw SMF data. You must convert it into a structured format like JSON or CSV.

  • Field Mapping: During conversion, ensure you map key forensic fields:

    • Source/Destination IPs: Found in SMF Type 119 records.

    • User IDs: Found in SMF Type 80 (RACF) records.

    • Timestamps: Critical for chronological event correlation.

  • Tools: If you use IBM CDP, it can automatically transform SMF records into JSON before sending them. Otherwise, you may need a Python or Rexx script to parse the dumped records and convert EBCDIC values to ASCII.



3. Ingestion: Visualizing in Teleseer


Teleseer specializes in taking logs (like Zeek/Bro logs or CSVs) and turning them into a visual network map.

  • Custom CSV Parser: Teleseer features a Custom CSV Parser. You can upload your transformed SMF data as a CSV. By mapping your columns to Teleseer’s attributes (like IP addresses and MACs), the platform will "adorn" its existing network map with your mainframe data.

  • Forensic Mapping: Once ingested, you can visualize how a mainframe User ID correlates with specific network traffic, allowing you to see if a compromised account is being used to probe other parts of the network.





__________________________________________________________________

Z/os handles financial transactions/accounts/ protecting the network with TeleSeer can enhance security.


Summary Table for Financial Services

CapabilityTechnology ComponentFinancial Use Case
AutomationEquitus KGNN + Power 11Real-time reconciliation of "Unmatched Transactions."
AuthorizationKOGEN + TeleSeer + z/OSZero-trust access to "Confidential Computing" memory.
AugmentationEquitus 7 + SpyreGeo-spatial risk modeling for global trade finance.
SecurityEVS + IBM Cyber VaultPhysical and digital ransomware protection for data centers.





Next article will provide a sample JCL script for dumping specific SMF record types, or would you prefer a Python snippet to help convert a CSV of those logs into a JSON format Teleseer can more easily process?




Introduction to Teleseer

This video provides an overview of how Teleseer automates network analysis and visualization to help security teams identify risks and protect critical infrastructure.






2 comments:

  1. Replies
    1. AI operating software is the key towards artificial infrastructure and security.
      Just like Steve Jobs, AI will act as a team of professions under your control, ready to
      Improve, create and secure your business operations and security. This is how the first OS was created. He always had a team of professionals around him creating and protecting company assets at all times.
      All you need is a good director.

      This ability is now available and we offer the first demo for free.

      Delete

Introducing Cyberspatial

  "PROJECT NETWORK EYE" Save hours of time getting to know your network... AIMLUX.ai presents Cyberspatial: A fundamental reset of...