Skip to main content
MainTegrity Cyber Security Framework (CSF)
MainTegrity Cyber Security Framework (CSF)
End-to-End Cyber Security for IBM z/OS

MainTegrity CSF + IBM SGC
The industry’s most complete mainframe cyber resilience solution.

Why IBM Safeguarded Copy is Foundational

IBM® Safeguarded Copy creates immutable, point-in-time copies of critical data and isolates them from production—so organizations can safeguard information against user error, malicious changes, or ransomware and recover with confidence.

How CSF Supports SGC

Building on SGC’s strength, CSF connects directly  to DS80xx storage, pinpointing the pre-attack SGCs needed for surgical data restore. In addition, CSF can monitor the creation of SGC backups and report any failures encountered. 

Download the Full Overview

CSF's intelligent browser-based UI 

CSF integrates directly with CSM (Copy Storage Manager) or LCP (Logical Corruption Protection) on DS8000 via RestAPI to find and display the list of available SGCs. Since CSF knows the time of attack, it can identify the right SGC to recover your data using existing tools.

Working in tandem, CSF automates the recovery of compromised system software. This ensures both system and data can be returned to their trusted state quickly and precisely.

But, unlike other mainframe products, CSF can:

Identify and eliminate malware / ransomwareDetect and stop rogue encryptions instantlyFreeze offending actors to mitigate damage and reduce human reaction time
Send real-time alerts with automated actions to assist support staffDynamic exfiltration intervention – prevent outage / damageSupport recovery from Conventional & Immutable Backups
Automate surgical restore of components to the trusted stateIntegrate with ServiceNow, Splunk, Rocket, Vertali, IBM, Dell, Hitachi, BMC …

Neutralize insider threats by monitoring suspicious actions

CSF + SGC

SGC CapabilityCSF EnhancementCombined Benefit 
Whole site backups Identify what was compromised Faster, more accurate recovery decisions 
ImmutableForensic timeline integration

Know exactly which SGC to use

Multiple recovery points 
Attack intelligenceUnderstand when/what must be recovered
Comprehensive recovery assetsLinks to Copy Services ManagerKnow when SGC creation succeeds/fails

How CSF Amplifies SGC Value

Improved Visibility

  • GUI-based SGC viewer showing all available recovery points
  • Visual timeline of SGC creation history
  • Quick identification of optimal recovery points
  • Simplified recovery initiation
  • Optional integration with surgical recovery tools 

Proactive Monitoring

  • Automated SGC creation monitoring via DS8000 REST API
  • Real-time alerts for failed or incomplete SGC creation
  • Email/SMS notifications to support staff
  • Complementary attack prevention

Surgical Recovery

  • File Integrity Monitoring (FIM+) shows exactly what changed and when
  • Forensic timeline correlates attack with SGC recovery points
  • Trusted intelligence about which SGC predates compromise
  • Recovery Assist automates system restoration while data recovery proceeds
  • Verify integrity of system recovery

CSF enhances immutable backups with intelligent, guided recovery.

IBM’s Safeguarded Copy (SGC) creates immutable, point-in-time snapshots of your data. These copies are isolated from the production environment, ensuring protection from malicious actions and ransomware. 


However, recovery can be complex — determining which copy to restore, verifying system integrity, and coordinating human response all take precious time during an attack.

In the rare event that recovery is required, CSF automates the process:

  • Queries the DS80xx subsystem to generate SGC lists

  • Displays available copies for instant selection

  • Provides critical knowledge to enable data restoration with existing tools

  • Performs automated surgical system restore to trusted state  — something z/OS alone cannot do

Ready to strengthen your mainframe resilience?

See how CSF and IBM Safeguarded Copy work together to protect, monitor, and recover your critical data.

Contact Us