Are You a Vendor? Claim Your Listing
Take control of your product listings. Add verified information, showcase updates, and unlock a Claimed Vendor badge across the directory.
Claim Your Listing NowShowing 1-24 of 158 products
ACF2
Active
The ACF2 architecture comprises several key components that work together to provide comprehensive security for mainframe environments. At the core is the ACF2 security database, which stores user...
Top Secret
Active
Top Secret's architecture comprises several key components, including the security server, access control database, and monitoring agents. The security server enforces access control policies...
RACF
Active
# RACF: Architecture Blueprint RACF (Resource Access Control Facility) is a core component of IBM's mainframe security architecture. It consists...
Vanguard Analyzer
Active
Vanguard Analyzer's architecture is designed for scalable and reliable RACF security auditing on z/OS. The core components include: 1. **Audit Engine**: Performs...
Vanguard Configuration Manager is designed with a three-tier architecture comprising the Audit Engine, Reporting Module, and RACF Data Collector. The RACF Data Collector extracts security data from the z/OS RACF...
Alert/CICS
Active
Alert/CICS is a security product designed to protect CICS transactions, programs, files, and BMS maps. It secures CICS resources by intercepting...
Alert/VSE
Active
Alert/VSE is a security solution designed for zVSE/VSEn environments, providing robust protection for datasets, programs, and other critical resources. It secures transactions,...
Sponsored
Time Pressure Made Productive
Turn time constraints into motivation with visual timers that drive action and results
PLMS
Not Supported
PLMS (Partitioned Library Management System) architecture comprised several key components: the control program, update routines, backup utilities, and reporting modules. These components communicated...
RC/Secure for Db2
Active
RC/Secure for Db2 provides a centralized architecture for managing Db2 security across multiple subsystems. The main components include the Security Policy Manager, the Reporting Engine, and the Audit Logger....
CA Alert/VM
Not Supported
CA Alert/VM was a security management solution for z/VM systems. It provided centralized monitoring and alerting capabilities, helping administrators identify and respond to potential security...
CA VM:Secure
Supported
CA VM:Secure is a security solution tailored for z/VM environments, offering features such as access control, authentication, and auditing. It uses role-based...
CA EDP/Auditor
Not Supported
CA EDP/Auditor was a security audit and reporting tool designed for mainframe environments. It provided organizations with the ability to generate reports on security vulnerabilities, potential threats, and compliance-related activities....
Auditor for z/OS
Active
Auditor for z/OS is a comprehensive security analysis tool designed for the z/OS operating system. It automates the process of identifying potential security exposures by analyzing...
Janus Network Security
Active
Janus Network Security is a middleware solution designed to secure network communications for Model 204 applications. It implements SSL/TLS encryption to protect data transmitted...
Sponsored
Plan Your Perfect Indian Adventure
Expert travel tips local cuisine recommendations and insider knowledge for every region of India
SirSafe
Supported
SirSafe is a security application designed to enhance the security of Model 204 databases running on z/OS and z/VM mainframe platforms. It...
Cleanup
Active
Cleanup is a z/OS utility designed to automate the process of identifying and removing obsolete, unused, or redundant security rules from RACF, CA ACF2, and...
CA Pro-Audit for DB2
Not Supported
CA Pro-Audit for DB2 was designed to provide security auditing and reporting for DB2 environments on z/OS mainframes. The architecture involved extracting data from SMF records,...
CA LDAP Server for z/OS
Supported
CA LDAP Server for z/OS provides LDAP services for z/OS, integrating with CA ACF2 and CA Top Secret. It acts as middleware, translating LDAP requests into commands understood by these...
R to R
Active
R to R is a tool set that provides REXX APIs for developing RACF applications on z/OS. It simplifies the development process, allowing...
CA VISION:Excel
Supported
The architecture of CA VISION:Excel is centered around three primary components: data input, processing, and output. The data input component is responsible...
Compliance Event Manager
Active
The architecture of Compliance Event Manager (CEM) is designed for robust security event management on z/OS. The core components include the Event Collector, Event Processor, Data Warehouse, and Reporting...
Siteminder
Active
The architecture of Siteminder on z/OS comprises several key components that work together to provide web access security. The Web Agent, residing on the web server (IBM HTTP Server...
Sponsored
107 Ways to Transform Your Life
Curated lists of actionable ideas tips and strategies across personal development and lifestyle
RA/2
Active
The RA/2 architecture is designed to provide efficient and scalable RACF administration and security auditing on the z/OS platform. The main components include the ISPF...
RA/7
Active
The RA/7 architecture is centered around three primary components: the SMF Data Collector, the Report Engine, and the Administration Interface. The SMF...
Share Your Product Experience
Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.
Share Your Experience