SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Tectia Server for IBM z/OS logs events with
(auditing) is very important for security. You should check the logs often,
or use tools to analyze them. From the logs, you can see whether
unauthorized access has been attempted, and take further action if needed.
For example, you could add the hosts from which the attempts have been made
DenyHosts, or drop the
packets from the domain completely at your firewall.