What is NetWatch?
No amount of backup will help you recover.
Data theft is the preferred attack vector because criminals know they can extort the most ransom and cause the most pain.
Ransomware insertion and file encryption can be reversed. But when data leaves your control, no amount of backup will retrieve it.
Once stolen, data is gone and can not be retrieved - ever. It can be published, sold, or weaponized indefinitely.
You Have Nothing Today
Protect Against Lateral Network Attacks
No amount of backup will help you recover.
Data theft is invisible
There are no z/OS tools to detect or stop a theft in progress. Data exfiltration looks like normal workload from a trusted source—but there are telltale signs if you have NetWatch.
Your Only Defense
NetWatch Capabilities
No network agents required. CSF monitors from within z/OS so you don't need to install software on external devices you may not own.
Endpoint Monitoring — 24/7
- Automate Vigilance - People can't monitor thousands of network nodes manually. Netwatch can.
- Integrate with the CSF UI - allow rapid recovery or system wide revoke
- Filter real-time network messages for significance and display in CSF browser
- Learn what is normal for transfer jobs and device behavior — Establish baselines automatically
Data Breach Protection
- Identify any connection that is not encrypted on production systems
- Detect transfers exceeding data thresholds. Look for excessive volume changes in network characteristics
- Monitors multiple kinds of data transfer tools TSO, batch, FTP, SSH, IND$FILE
- Disallow secondary links in TSO to avoid users copying to an external link
Stop Attacks Instantly
- Real-time suspend of offending data transfers — Freeze suspicious activity immediately
- Improved network knowledge & investigation — Forensics browser shows z/OS relevant information
- Revoke offending user IDs to lock out other attacks — Prevent attackers from re-using same credentials
What Happens When NetWatch Finds Something
NetWatch Sees What Others Don't
What is network awareness and what does it look for?
- A network node that normally requests 10k of data suddenly asks for gigabytes — the classic exfiltration signature.
- Messages from IBM Comm server and other network tools go unnoticed because there is no automated alerting.
- An endpoint that is misconfigured to allow unencrypted transfers goes unnoticed for months.
- A user opens a secondary TSO link — a simple attack that allows the user data to be copied to a secondary location.
- User ids behind the transfer are often invisible. This leaves the site open malicious actions by the compromised user id.
