Share Your Product Experience
Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.
Share Your ExperienceShowing 49-72 of 158 products
E-SME
Not Supported
E-SME's architecture comprises several key components. The Request Processor receives and validates security change requests. The Policy Engine enforces security policies and rules. The Audit Logger records security-related...
I.C.U...MVS
Active
The architecture of I.C.U...MVS is designed for efficient security analysis and reporting within the z/OS environment. The main components include the Report...
Password Manager
Active
The architecture of Password Manager comprises several key components. The Password Synchronization Engine is responsible for the core function of synchronizing passwords across...
Identity Manager
Active
The Identity Manager architecture consists of several key components: the Identity Manager Server, Connectors, and the administrative console. The Identity Manager Server is the central...
Privileged Access Manager
Active
The architecture of Privileged Access Manager is designed for secure and scalable privileged access management. The core components include the Password Vault,...
ASG-Admin for Security Server
Supported
The architecture of ASG-Admin for Security Server comprises several key components. The User Interface (UI) provides a graphical and command-line interface for administrators to interact with the system. The...
ASG-Audit for Security Server
Supported
The ASG-Audit for Security Server architecture comprises three main components: the z/OS data collector, the Windows-based GUI, and the reporting engine. The z/OS data collector resides on...
Sponsored
Your Guide to Better Living
Practical wisdom organized in engaging lists covering health career relationships and more
ENTACT!API
Not Supported
The architecture of ENTACT!API comprised several key components designed to facilitate secure access to z/OS security services. The central component was the API server, which acted...
Entact ID Request
Supported
The architecture of Entact ID Request is designed for scalability and cross-platform compatibility. The main components include the Request Portal (web interface), the Workflow Engine (for request processing), the...
Entact ID Manager
Supported
The architecture of Entact ID Manager comprises several key components. The ID Manager Server is the central component, responsible for managing user identities,...
Entact ID Reset
Supported
The architecture of Entact ID Reset is designed for scalability and security, with key components working together to provide automated password reset functionality across z/OS, Windows, and UNIX platforms....
Entact ID UniPass
Supported
The architecture of Entact ID UniPass is designed for robust and secure cross-platform password synchronization. The core components include the Synchronization Engine, the Password Filter, and the Configuration...
Entact ID
Supported
The Entact ID architecture is based on a distributed, modular design. The main components include ID Manager, ID Request, ID Reset, and UniPass. ID Manager serves as the central hub...
Correlog zDefender for z/OS
Active
The architecture of Correlog zDefender for z/OS is designed for efficient collection, processing, and transmission of security events. The main...
Sponsored
Time Pressure Made Productive
Turn time constraints into motivation with visual timers that drive action and results
z/MQAUSX
Active
The architecture of z/MQAUSX comprises several key components designed to secure WebSphere MQ on z/OS. The MQAUSX Security Exit is the core component, intercepting MQ API...
z/MQCACM
Active
The architecture of z/MQCACM comprises several key components designed to provide robust control over WebSphere MQ channel auto-creation. The Policy Engine is the core component, responsible...
z/MQSSX
Active
The architecture of z/MQSSX comprises several key components designed to secure external access to IBM MQ on z/OS. The Channel Interceptor is a...
ZEN FTP Control
Not Supported
ZEN FTP Control's architecture was centered around securing FTP file transfers on z/OS. The main components included a monitoring module,...
ZEN EE Security
Not Supported
ZEN EE Security's architecture centered on securing APPN/HPR traffic on z/OS. The main components included authentication, encryption, and network traffic management modules. These...
VitalSigns for FTP
Active
The architecture of VitalSigns for FTP comprises several key components designed to provide secure and auditable FTP file transfers on z/OS....
LOCKOut
Not Supported
The LOCKOut architecture was centered around a secure authentication process for VTAM networks. The main components included the Authentication Server, User Database, and Network Interface. The Authentication Server was responsible...
SafeWord
Not Supported
The SafeWord architecture comprised the following key components: SafeWord Server, Authentication Modules, and Cryptographic Tokens. The SafeWord Server was the central...
Sponsored
Modernization Success Stories
Learn how Fortune 500 companies successfully modernized their mainframe infrastructure
CICS/Signon
Active
The architecture of CICS/Signon is centered around its integration within the CICS environment. The main components include the Signon transaction program, security modules, and terminal control. The Signon...
CICS/Timeout
Active
The architecture of CICS/Timeout is centered around three primary components: the Timeout Monitor, the Session Interceptor, and the Configuration Manager. The...
Share Your Product Experience
Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.
Share Your Experience