All Products
Kobee
Kobee is a dedicated DevOps and Toolchain Orchestration solution, especially built to be used in enterprise environments where high customisability and transparency is key. Kobee provides all the features and third-party integration connectivity to implement CI/CD into any environment. Version Control Repositories include GIT/GitHUB, Azure DSVC, TFVC, CVS, and replace or interface with mainframe SLMs. Caters for Release Management, CI/DC, Traceability, Approval Management, Toolchain Orchestration.
Zetaly Cost Control
ZCC is a visualized and comprehensive solution to control costs and keep track of your budget. What this means for you: See the costs of your current production in near real time; Understand cost factors, trends, and distribution between software; Assess the impact of business activities on mainframe costs; Automate chargeback reporting for internal and external customers; Automate chargeback reporting for internal and external customers; An eye on your contractual commitments to stay within budget.
Zetaly Service intelligence
ZSI is a visualized and administrative solution to make sense of your operational data harnessing the full power of Business Intelligence.
Out-of-the-box: Overview dashboards are great analytics starting points to understand the big picture. Component-based dashboards focus
on performance and provide in-depth details needed for optimization.
Zetaly Automated Capacity
(Formerly ASC - AutoSoftCapping) - ZAC optimizes the performance of your system while controlling your Workload License Charges. ASC safeguards the right MSUs are in the right place, at the right time and for the right cost. ASC offers savings in license charges and capacity optimization to those
z/OS sites having multiple LPARs on the same CPC, possibly with different peak times, and preferably under a sub-capacity agreement like VWLC or AWLC. Most z/OS customers under sub-capacity agreements use GCL so this means that they suffer group capping issues when a single partition becomes capped, and the effect is that they cannot easily manage who to give the best service to during capping times. It is useful also for those not having a full variable agreement with IBM (and other ISVs offering workload licenses), aiming to reduce production capping times, and to "enlarge"
the capping effect generated by the R4HA mechanism.
P-TRACKER
Collects usage information on all program and subprograms loaded/executed under z/OS.It covers all environments: batch, IMS/DC, CICS and other sub-systems. Using P-Tracker, one can focus in on usage of modules, datasets, applications and products/licenses and for inhouse applications determine the chained calls at loaded sub-programlevel. One can quickly and easily identify applications and products that are unused, under-used, duplicated or scattered.
Automatically records every program/task invocation on the system, including sub-system level when required. [Assembler, 3GL, 4GL, REXX interpreter, PROCs, JCL, Clist,..]
JES3plus
JES3plus is a licensed, derivative work based on IBM®’s z/OS® JES3 V2R4 source code. Created with customers in mind, JES3plus provides existing JES3 customers a common-sense alternative to a costly and potentially risky JES2 conversion. Customer implementation involves a trivial migration to a fully supported product, with a road map for enhancements, no planned end of life, and no additional licensing costs.
(E)JES
(E)JES is a systems management tool that provides all the information you need to monitor, manage and control your z/OS JESplex—whether you are running JES2 or JES3. (E)JES panels provide up-to-date information on jobs, printers, queues, and resources in a z/OS JESplex. You can enter (E)JES commands directly from these panels to manage job processes and the operation of system resources.
P-TRACKER
Collects usage information on all program and subprogram calls under z/OS. It covers all environments: batch, IMS/DC, CICS and other sub-systems. Using P-Tracker, one can focus in on usage of modules, datasets, applications and products/licenses and for inhouse applications determine
the chained calls at sub-program level. One can quickly and easily identify applications and products that are unused, under-used, duplicated or scattered. Automatically records every program/task invocation on the system, including sub-system level when required.
InterSession
InterSession is a modern 3270 session manager for mainframes that gives all users secure, fast and convenient access to their applications.
After logging on the user is presented with a menu of authorized applications and also gives the users Single Sign-On access. InterSession supports all current IBM mainframe operating systems (z/OS, VSE and VM), and all VTAM application host systems (i.e. CICS, TSO, IMS,...). The TN3270 support supports all current IBM TCP/IP stacks and TCPaccess from CA. InterSession comes with migration tools to help you migrate from old session managers such as Net/Master and TPX.
And you have the InterSession Web Gateway so you can say "goodbye" to TN3270 emulators meaning no installation or support outside the mainframe!
SoftDATE
Date-dependent processing is universal across a wide variety of applications in all industry segments and is as important as ever in the on-demand,
SOA world. Today, many z/OS mainframe applications serve Business Process Management across multiple platforms using de facto standards such as DB2 Stored Procedures, SQL, Java and XML. This BPM integration requires exact date and time consistency to ensure results are reliable for rapidly expanding user communities, reducing risk to the minimum. Softdate is the most technologically advanced product in the market, providing unique and exclusive features simply unavailable elsewhere. For example, Parallel Sysplex support, CICS MRO (Multi Region Operation) support, z/OS 64-bit support for data above the 2-gig bar, Java language support for all execution environments (e.g. batch, CICS, IMS, WebSphere Application Server).
ZIP/390
ZIP/390 is an enterprise zip and Multi-Platform Integration utility for simplifying the efficient and secure trafficking of data across divergent platforms and competency levels within the enterprise and beyond. Employing the ZIP standard, ZIP/390 reduces the logistics, time and cost of exchanging files between all major computing platforms and other Zip utilities (currently deployed on servers, desktops, mobile devices, and the cloud). Banking level encryption helps address security compliance by providing strong data level protection, while in transit and at rest.
ULT4DB2
ULT4DB2 is a powerful log analysis tool that makes it easy to observe changes to DB2 tables. Whether you want to propagate data to different tables, undo faulty changes that were made to a production table, or populate an auditing table with a detailed list of changes that have been made, ULT4DB2 makes it easy for you to make the most of your DB2 log.
QuickSelect for Db2
Unwanted levels of CPU consumption in applications are regularly spent on SQL that is repeatedly retrieving static key data such as Price-Plans, Zip/Post Codes, Fees, User Authorizations, etc. Those seemingly simple SQLs that are executed during peak time cause higher costs as there is no way of avoiding those repeating SQLs. QuickSelect is a detachable solution that can be switched on or off, not something embedded or hardcoded into your system, provide the results faster than Db2 buffer pools can provide, completely transparent to applications, providing 100% data integrity for data updates from application programs and IBM Db2 utilities. And saving you money in the process.
SQLQC
The majority of modern applications generate SQL statements immediately prior to execution, requiring a new approach to measure statements in an ever changing and unknown environment. SQLQC (SQL Quality Control) is designed to address these new challenges continuously analyzing the current DB2 workload and offers suggestions for real improvement.
BCV5 - IceBox
For intermediate copies and refreshes! Need to provide DB2 data from last week, last month or last year? Want an automatic and efficient procedure
to recreate everything, DDL and data in record time? BCV5 Icebox takes fast snapshots on demand or periodically, and restores the objects
or databases where/when needed using names specified. Issues of compatibility or completeness no longer cause concern. Icebox packages
the DB2 Version x image-copy and later restores it to any other DB2 target version required. Upgrade to a newer version of DB2 knowing that former image copies will be still available for future needs.
BCV5
Provides for fast copying of DB2 databases or tables within the same or to another DB2 system. Compared with other conventional copying methods, BCV5 saves about 90% on elapsed copy time and over 90% on used resources (SSU, SRU). BCV5 copies DB2 data, i.e. databases or tables,
with or without auxiliary objects - indexes, views, triggers, procs, runstats. The same is true for copying between different DB2 subsystems – referred
to commonly as migration – where BCV5 automatically attends to OBID translation and RBA adaptation. With BCV5, copy jobs are completed in minutes where before they took hours. Weekend work can be executed within regular night shifts. Test data may be refreshed any time.
Note with BCV5 the suspension of live databases in the copying process is not necessary, i.e. no Quiesce or Shutdown required.
The target tablespaces are updated accordingly via the source DB2 log to a selected point in time.
BCV4
BCV4 provides for fast copying of DB2 and IMS systems. Modern storage subsystems support mirroring of disk data where primarily you have the ability to separate and reconnect the mirror copy very quickly with your server (BCVs). However in the z/OS world such volumes are normally used only as backups. Duplicate VVDS names, duplicate VTOC index names and hundreds or thousands of duplicate dataset names prevent the immediate use of these target volumes. BCV4 offers the functionality to rename these volumes quickly and systematically. After processing through BCV4 the target volumes may be used by standard z/OS access methods. BCV4 offers complete "make usable" functionality after the creation of the mirrored environment, where all necessary work is carried out in a single job. BCV4 further offers the capability of adjusting DB2 system entries and internal catalog structures (catalog/index, Bootstrap, Logcopy, Logs, table spaces, ..) creating a "new" DB2 system on the mirror image.
XDM
XDM quickly and efficiently copies, refreshes and replicates databases, tables, views, etc. within the same or to different DBMS systems. A XDM copy task integrates both, the physical data movement and the appropriate DDL treatment. It copies tables and databases and XDM creates the data objects at the target if they are not yet present. XDM always chooses the fastest and most efficient method to move the data. Hence copy jobs executions are completed in record time. DBAs are no longer forced to wait for weekend time slots. They are able to copy/migrate test data on regular weekday shifts, without preparing and controlling sophisticated processes. The huge check list, which is usually indispensable for such tasks, can eventually be dropped. [Platforms include z/OS, Linux/Unix, and Windows. DBMS include DB2, IMS, Oracle, SQLDS, PostgreSQL, & other RDBMS]
SAE - Stand Alone Environment
SAE - Stand Alone Environment allows access to z/OS volumes and datasets without having an z/OS active. Full range of ISPF like features, Fast DASD Erase to delete a farm in less than 30 minutes with audit report, and Dataset Utilities to ensure critical datasets are always immediately accessible including restore of datasets from DFDSS & FDR volume backups. SAE itself IPLs in 7 seconds, where normally your start-up pack requires 10 to 30 minutes. Essential to any disaster recovery plan as you execute your plan faster and have your production system up and running quicker, and avoid
any back-outs. With Rel. 17 it supports the HMC Integrated Console so you can IPL with Integrated 3270 (SYSG=ENABLE) as well as traditional IPL with console device (SYSG=DISABLE).
ICEDirect
ICEDirect was developed to answer an additional need created by the evolution in Operational Integrity: Data Visualization. With the requirements
for a ZTA (Zero Trust Architecture) and other information sources it became clear that the traditional reporting methods had enhanced requirements
to share critical information captured and stored by various tools and services. ICEDirect is a highly secure browser interface into the ICE data space
that can easily provide information from its data capture and store it in a format that is both intuitive and visually easy to understand.
ICEDirect also provides analytic capabilities for other z/OS critical data, such IODF configurations, the z/OS Health Checker (all LPARS in a SYSPLEX
in one view), RACF, Certificates management, and LD-IPL. These analytic capabilities allow for an easy method to view, understand, and make the audit legible for non-specialists of these sources.
A mitigation for vulnerabilities in customized versions of z/OS 3.1 is now available in the form of List Directed IPL (LD-IPL) and its two supporting components in Validated Boot and Secure Boot - Available for creation using ICE-Direct and for Inspection using Image Focus.
The Control Editor
The Control Editor (TCE) is designed to establish and maintain best practices for an institution to enforce Infrastructure Administration controls.
Some of these best practices which can be automatically performed by TCE would be to always create a backup of critical components when changed and maintain history and versions for each change. Provide and enforce a method of consistent documentation for change activity. Create a persistent method of notification when action is taken that may change the definition or running (dynamic) values of z/OS LPAR and sub-systems.
TCE also provides additional controls beyond those provided by traditional External Security products, which allow for the requirements of Dependency Mapping and Excessive Access Checking (NIST SP 800-207). TCE can be the central tool in any Security policy enforcement for critical z/OS datasets, Load Libraries and UNIX files.
Image Focus
Image FOCUS provides a uniquely powerful capability to perform inspections & verifications of critical configuration elements that define and control the startup and operational parameters of a z/OS LPAR and major subsystems such as JES, VTAM, TCP/IP, CICS and security definitions like PAGENT
and SERVAUTH. Image FOCUS also detects changes to these same critical elements and evaluates the impact of the changes on the readiness
and availability of the z/OS LPARS / SYSPLEX.
ICE - IMAGE Control Environment
ICE - IMAGE Control Environment detects changes, points of failure, and risks to the integrity of the z/OS systems. ICE help systems staff to examine the system and document for management, security and audit teams, that their job is being done correctly, has been verified and does not have further unintentional adverse impact outside of where the change was made. So no change management request is closed prior to proof of valid liveand target systems.
A background monitor activates a virtual IPL for each image (and its alternate images) using the zOS-Inspector, Sysplex-Inspector, and primarysub-system inspectors (e.g. JES, VTAM, TCPIP) maintaining in-depth change-management and documentation of your images. Additionally for DR purposes ICE runs as a started task directly under z/OS and automatically creates and maintains full screen access, ISPF/PDF, to its own z/OS sub-system when VTAM, JES or TSO are unavailable giving various system management and recovery functions.
P-Tracker
P-Tracker collects usage information on all program and subprogram calls under z/OS including Batch, IMS/DC, CICS, TSO and other sub-system environments. Using P-Tracker, one can focus in on usage of modules, datasets, applications and products/licenses; and with inhouse applications determine the chained calls at sub-program level. One can quickly and easily identify applications and products that are unused, under-used, duplicated or scattered. Automatically collects information on every module invocation on the system, including sub-system level when requiretransactions when required.
z/OS EXIT Explorer
z/OS EXIT Explorer to determine where your inhouse, IBM and ISV z/OS exits have been applied to z/OS and associated sub-systems - all 500 plus - across diverse areas where no one manager or auditor will have relevant expertise to understand what is in place and what changes with new product installs or new z/OS releases. And with inhouse exits you have the added worries of relevant expertise in specialized assembler programmers "leaving".
zOSEM
zOSEM offers a methodology and ISPF interface to provide today's data center a proactive solution to the challenges of fewer systems programmers.
It also offers an opportunity to make the task of managing system environments an administrative one, rather than a technical programming issue. zOSEM makes it much easier for installations to manage system resources and to control how they are used. It enables z/OS management to:
Manage & Improve System Throughput
Eliminate Exits Migration Issues including any customization complexities
Reduce & Control ISV (& IBM) Costs utilizing Job and Step-level Resource Routing
Reduce HSM CPU Consumption & add comprehensive reporting for HSM activities
See some of the zOSEM functional area benefits.
