Security
In a recent study done by IBM1, the majority of CEOs and CIOs identified risk management as an area where they will focus IT to help their organizations' strategy over the next five years. Therefore, because CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise, the protection of these assets is a essential part of any CICS integration project.
When you consider the security design for your CICS application, you need to weigh the following key issues:
How will you ensure that the ...

Get CICS and SOA: Architecture and Integration Choices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.