Skip navigation

Partner Community

January 2019 Previous month Next month
Share This:

GettyImages-612012708%20copy.jpgBMC is inviting you to participate in the development one of ZSolution’s most exciting products in recent years. You’ll have an opportunity to engage directly with BMC product experts, product management, and R&D to help validate and provide feedback on the capabilities of the initial release of AMI Predictive.


AMI Predictive is a machine learning powered solution to predict and notify of potentially crippling events before they happen. The AMI Predictive validation program is open to all BMC customers and partners.


BMC AMI solutions span the entire ZSolutions’ portfolio including Security, DevOps, Capacity and Cost Management, and Artificial Intelligence (AI) Operations. The initial focus of the Friends of AMI community will be on AI Ops solutions and expand to the other products in the future.


The first validation program will be for AMI Predictive. AMI predictive will provide these initial capabilities:

  • Domain expertise-built machine learning models based on decades of experience
  • System health insights based on multi-variant correlation
  • Out-of-the-box detection of dozens of potentially catastrophic system events


Participation includes the following:

  • Contribute your operational metrics to help validate the models.
  • Participate in periodic sprint reviews where developers demonstrate designs, mockups, and working code in return for your feedback.
  • Participate in facilitated product validation: log into one of our sandbox environments and provide feedback.
  • Accept pre-release code into your test environment, and provide critical hands-on feedback.
  • Collaborate with BMC and other partner and customer participants to provide open feedback.
  • Be a willing Customer Connect Reference upon successfully completing the program.


Complete these steps to join:

  1. Complete both beta agreements.
  1. Complete the Onboarding Survey.
  2. Click the Ask to join this group button in the Automated Mainframe Intelligence group.
Share This:

bad-guy.jpgFeeling vulnerable is uncomfortable because it means you are open to risk. We can feel this way when we have neglected to take proper measures to keep ourselves safe. CIOs who don’t address security issues seldom rest easy.


The upside to being vulnerable is that you are being honest about the situation you are facing rather than living in denial. Denying a dangerous situation puts us more at risk, but directly addressing the danger means that we, as individuals or organizations, regardless of the short-term discomfort, have a better chance to mitigate the danger and secure our safety.


As our dependence on technology grows exponentially so do the associated risks and tools that help us automate and manage the tasks we need to do to protect ourselves.


Comprehensive plans yield big benefits

CIOs recognize the importance of a comprehensive security plan. IDG reports that the cybersecurity industry is seeing one of the biggest increases in spending by organizations this year.


"In 2019, 72% of tech executives expect their spending on cybersecurity to increase, while 25% report it will remain the same. Currently, 63% of organizations have cybersecurity solutions in use – 17% of which are upgrading/ refining their solutions. Of the businesses that don’t have cybersecurity solutions in place, 36% are either researching or piloting their solutions."  -A Guide to the CIO’s 2019 Tech Priorities, IDG


Comprehensive security plans include vulnerability assessments and mediation plans. Unfortunately, these tasks are not once and done operations. Accessing vulnerabilities and addressing them requires constant attention. It is like putting in work to maintain a relationship or staying fit and healthy. The upfront cost and proactive work yields big dividends. Vulnerability assessment should be an integral part of your IT operations.


The cost of data breaches

Data breaches can be devastating. They are often high profile with monetary losses being just the beginning. Theft of confidential data can end careers and deeply damage an organizations brand. According to statistics published by the UK Government, over 40 percent of organizations suffered a security breach of some kind last year – slightly less than a coin toss and other
surveys suggest the odds are worse than that.


However, Gartner studies maintain that 99 percent of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident.


How BMC and BMC partners can help

BMC partners can help you leverage BMC solutions to better identify your security and compliance issues, adding business insight, prioritizing action and then automating the remediation to reduce risk if you’re feeling a little vulnerable, now is the time to take action. Learn more about BMC Vulnerability Management today.