Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

As each generation of computers evolves, the complexity of operating systems increases significantly. This rising complexity has resulted in a more arduous and time-consuming process for auditing these systems. All operating systems, including mainframes, can experience security vulnerabilities stemming from improper installations, customizations, and bugs associated with product maintenance. CA Auditor serves as a robust software solution that automates the technical review of both the hardware and software environments, effectively pinpointing areas of integrity risk. It detects potential security vulnerabilities arising from misconfigured implementations, allowing for a thorough evaluation of the operating system and its various components. Additionally, it offers functionality to oversee system usage and maintain the integrity of essential system files. By utilizing CA Auditor, users can effectively address significant vulnerabilities within the z/OS operating system, enabling detailed auditing, integrity checks, and necessary verifications for enhanced security measures. This comprehensive approach not only mitigates risks but also fosters a more secure computing environment.

Description

The IBM® zSecure Suite provides multiple layers of security assurance, including auditing, alerting, administration, reporting, and authentication, which significantly improve security and risk management across IBM Z® hardware, software, virtualization, and popular external security managers (ESMs) like IBM RACF, CA ACF2, and CA Top Secret. By automating security administrative functions, the zSecure Suite enhances operational efficiency while minimizing the risk of human error, effectively identifying both internal and external threats, generating immediate alerts, and ensuring compliance with applicable standards. This suite not only automates key tasks but also plays a vital role in managing identity governance, which is crucial for adherence to regulatory requirements. Furthermore, it proactively detects threats, delivers real-time notifications, and monitors compliance with practices such as pervasive encryption to meet GDPR mandates. Additionally, it fortifies authentication processes to enhance user access controls, facilitating streamlined administration for security teams. Overall, the IBM zSecure Suite is a comprehensive solution that addresses the evolving security landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Delinea Cloud Access Controller
IBM Z
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

Integrations

Delinea Cloud Access Controller
IBM Z
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.broadcom.com/products/mainframe/compliance-data-protection/auditor

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/security/mainframe-security/zsecure

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Alternatives

CA Cleanup Reviews

CA Cleanup

Broadcom
Rocket z/Assure VAP Reviews

Rocket z/Assure VAP

Rocket Software
SDS IronSphere Reviews

SDS IronSphere

Software Diversified Services
SailPoint Reviews

SailPoint

SailPoint Technologies