Modernization Hub

Are You a Vendor? Claim Your Listing

Take control of your product listings. Add verified information, showcase updates, and unlock a Claimed Vendor badge across the directory.

Claim Your Listing Now

Showing 1-24 of 158 products

ACF2

Active
The ACF2 architecture comprises several key components that work together to provide comprehensive security for mainframe environments. At the core is the ACF2 security database, which stores user...
Top Secret's architecture comprises several key components, including the security server, access control database, and monitoring agents. The security server enforces access control policies...

RACF

Active
# RACF: Architecture Blueprint RACF (Resource Access Control Facility) is a core component of IBM's mainframe security architecture. It consists...
Vanguard Analyzer's architecture is designed for scalable and reliable RACF security auditing on z/OS. The core components include: 1. **Audit Engine**: Performs...
Vanguard Configuration Manager is designed with a three-tier architecture comprising the Audit Engine, Reporting Module, and RACF Data Collector. The RACF Data Collector extracts security data from the z/OS RACF...
Alert/CICS is a security product designed to protect CICS transactions, programs, files, and BMS maps. It secures CICS resources by intercepting...
Alert/VSE is a security solution designed for zVSE/VSEn environments, providing robust protection for datasets, programs, and other critical resources. It secures transactions,...
Sponsored

Time Pressure Made Productive

Turn time constraints into motivation with visual timers that drive action and results

PLMS

Not Supported
PLMS (Partitioned Library Management System) architecture comprised several key components: the control program, update routines, backup utilities, and reporting modules. These components communicated...
RC/Secure for Db2 provides a centralized architecture for managing Db2 security across multiple subsystems. The main components include the Security Policy Manager, the Reporting Engine, and the Audit Logger....

CA Alert/VM

Not Supported
CA Alert/VM was a security management solution for z/VM systems. It provided centralized monitoring and alerting capabilities, helping administrators identify and respond to potential security...

CA VM:Secure

Supported
CA VM:Secure is a security solution tailored for z/VM environments, offering features such as access control, authentication, and auditing. It uses role-based...

CA EDP/Auditor

Not Supported
CA EDP/Auditor was a security audit and reporting tool designed for mainframe environments. It provided organizations with the ability to generate reports on security vulnerabilities, potential threats, and compliance-related activities....
Auditor for z/OS is a comprehensive security analysis tool designed for the z/OS operating system. It automates the process of identifying potential security exposures by analyzing...
Janus Network Security is a middleware solution designed to secure network communications for Model 204 applications. It implements SSL/TLS encryption to protect data transmitted...
Sponsored

Plan Your Perfect Indian Adventure

Expert travel tips local cuisine recommendations and insider knowledge for every region of India

SirSafe

Supported
SirSafe is a security application designed to enhance the security of Model 204 databases running on z/OS and z/VM mainframe platforms. It...

Cleanup

Active
Cleanup is a z/OS utility designed to automate the process of identifying and removing obsolete, unused, or redundant security rules from RACF, CA ACF2, and...
CA Pro-Audit for DB2 was designed to provide security auditing and reporting for DB2 environments on z/OS mainframes. The architecture involved extracting data from SMF records,...
CA LDAP Server for z/OS provides LDAP services for z/OS, integrating with CA ACF2 and CA Top Secret. It acts as middleware, translating LDAP requests into commands understood by these...

R to R

Active
R to R is a tool set that provides REXX APIs for developing RACF applications on z/OS. It simplifies the development process, allowing...
The architecture of CA VISION:Excel is centered around three primary components: data input, processing, and output. The data input component is responsible...
The architecture of Compliance Event Manager (CEM) is designed for robust security event management on z/OS. The core components include the Event Collector, Event Processor, Data Warehouse, and Reporting...
The architecture of Siteminder on z/OS comprises several key components that work together to provide web access security. The Web Agent, residing on the web server (IBM HTTP Server...
Sponsored

107 Ways to Transform Your Life

Curated lists of actionable ideas tips and strategies across personal development and lifestyle

RA/2

Active
The RA/2 architecture is designed to provide efficient and scalable RACF administration and security auditing on the z/OS platform. The main components include the ISPF...

RA/7

Active
The RA/7 architecture is centered around three primary components: the SMF Data Collector, the Report Engine, and the Administration Interface. The SMF...

Share Your Product Experience

Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.

Share Your Experience