Events , Governance & Risk Management , RSA Conference

'Zero Trust' Security for the Mainframe

Broadcom's Stuart McIrvine Dispels Myths and Showcases New Realities
Stuart McIrvine, director, product management, Broadcom

The "zero trust" model, in the context of mainframe security, might be different than you'd think. Stuart McIrvine of Broadcom separates myths from realities and discusses the life cycle of zero trust on the mainframe.

See Also: Live Discussion | Securing Business Growth: The Road to 24/7 Threat Detection and Response

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, McIrvine discusses:

  • Myths and realities of zero trust and the mainframe;
  • How the model maps to mainframe security's core tenets;
  • Life cycle for zero trust on the mainframe.

Click here to learn how to achieve Zero Trust with the Broadcom Mainframe Security Suite.

As director of product management for the mainframe security products and the mainframe database tools products at Broadcom, McIrvine leads the development of the strategy for his portfolio and manages the product direction to ensure the needs of Broadcom customers are met. Previously, he spent five years at Hewlett Packard Enterprise, leading product management in both the security and IT operations management business units. Before HPE, he spent 21 years at IBM, where he led the development of IBM’s overall portfolio strategy for cloud computing.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.