Modernization Hub

Share Your Product Experience

Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.

Share Your Experience

Showing 49-72 of 158 products

E-SME

Not Supported
E-SME's architecture comprises several key components. The Request Processor receives and validates security change requests. The Policy Engine enforces security policies and rules. The Audit Logger records security-related...
The architecture of I.C.U...MVS is designed for efficient security analysis and reporting within the z/OS environment. The main components include the Report...
The architecture of Password Manager comprises several key components. The Password Synchronization Engine is responsible for the core function of synchronizing passwords across...
The Identity Manager architecture consists of several key components: the Identity Manager Server, Connectors, and the administrative console. The Identity Manager Server is the central...
The architecture of Privileged Access Manager is designed for secure and scalable privileged access management. The core components include the Password Vault,...
The architecture of ASG-Admin for Security Server comprises several key components. The User Interface (UI) provides a graphical and command-line interface for administrators to interact with the system. The...
The ASG-Audit for Security Server architecture comprises three main components: the z/OS data collector, the Windows-based GUI, and the reporting engine. The z/OS data collector resides on...
Sponsored

Your Guide to Better Living

Practical wisdom organized in engaging lists covering health career relationships and more

ENTACT!API

Not Supported
The architecture of ENTACT!API comprised several key components designed to facilitate secure access to z/OS security services. The central component was the API server, which acted...
The architecture of Entact ID Request is designed for scalability and cross-platform compatibility. The main components include the Request Portal (web interface), the Workflow Engine (for request processing), the...
The architecture of Entact ID Manager comprises several key components. The ID Manager Server is the central component, responsible for managing user identities,...
The architecture of Entact ID Reset is designed for scalability and security, with key components working together to provide automated password reset functionality across z/OS, Windows, and UNIX platforms....
The architecture of Entact ID UniPass is designed for robust and secure cross-platform password synchronization. The core components include the Synchronization Engine, the Password Filter, and the Configuration...

Entact ID

Supported
The Entact ID architecture is based on a distributed, modular design. The main components include ID Manager, ID Request, ID Reset, and UniPass. ID Manager serves as the central hub...
The architecture of Correlog zDefender for z/OS is designed for efficient collection, processing, and transmission of security events. The main...
Sponsored

Time Pressure Made Productive

Turn time constraints into motivation with visual timers that drive action and results

z/MQAUSX

Active
The architecture of z/MQAUSX comprises several key components designed to secure WebSphere MQ on z/OS. The MQAUSX Security Exit is the core component, intercepting MQ API...

z/MQCACM

Active
The architecture of z/MQCACM comprises several key components designed to provide robust control over WebSphere MQ channel auto-creation. The Policy Engine is the core component, responsible...

z/MQSSX

Active
The architecture of z/MQSSX comprises several key components designed to secure external access to IBM MQ on z/OS. The Channel Interceptor is a...

ZEN FTP Control

Not Supported
ZEN FTP Control's architecture was centered around securing FTP file transfers on z/OS. The main components included a monitoring module,...

ZEN EE Security

Not Supported
ZEN EE Security's architecture centered on securing APPN/HPR traffic on z/OS. The main components included authentication, encryption, and network traffic management modules. These...
The architecture of VitalSigns for FTP comprises several key components designed to provide secure and auditable FTP file transfers on z/OS....

LOCKOut

Not Supported
The LOCKOut architecture was centered around a secure authentication process for VTAM networks. The main components included the Authentication Server, User Database, and Network Interface. The Authentication Server was responsible...

SafeWord

Not Supported
The SafeWord architecture comprised the following key components: SafeWord Server, Authentication Modules, and Cryptographic Tokens. The SafeWord Server was the central...
Sponsored

Modernization Success Stories

Learn how Fortune 500 companies successfully modernized their mainframe infrastructure

The architecture of CICS/Signon is centered around its integration within the CICS environment. The main components include the Signon transaction program, security modules, and terminal control. The Signon...
The architecture of CICS/Timeout is centered around three primary components: the Timeout Monitor, the Session Interceptor, and the Configuration Manager. The...

Share Your Product Experience

Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.

Share Your Experience