Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Your mission-critical systems carry the weight of your entire organization. Protecting them shouldn't leave you guessing about hidden vulnerabilities or compliance risks. Rocket® z/Assure™ Vulnerability Analysis Program (VAP) is a specialized mainframe security solution built to proactively scan and safeguard your most valuable environments. By identifying system-level risks before they become active threats, we partner with you to ensure your infrastructure remains locked down, resilient, and fully compliant. We understand the responsibility of managing enterprise security, and our tool gives you the exact insights you need to confidently eliminate weak points. Key benefits for your security team: - Identify and resolve hidden vulnerabilities with deep, automated scanning. - Protect your mission-critical data from evolving external and internal threats. - Streamline compliance reporting with clear, actionable security insights. Take control of your mainframe security. Partner with Rocket Software to protect your digital foundation today.

Description

UKM effectively discovers, addresses, and oversees SSH user keys while ensuring that business systems remain uninterrupted and workflow is smooth. It identifies and monitors existing keys, confirms trusted connections, renews authorizations, and eliminates inactive keys when necessary. There are no alterations to processes or uncertainties regarding compliance, and it also reduces expenses in the process. UKM serves as an ideal solution for businesses of any size that prioritize the management and protection of their secure shell environments. The system automatically monitors SSH key activity and updates access permissions while identifying and discarding potentially harmful or unused keys, all without causing disruptions to ongoing operations. By consolidating oversight and automating key management, businesses can significantly cut the overhead costs associated with SSH keys, potentially saving millions annually. Although SSH is recognized as the gold standard for securing data transfers, mismanaged SSH keys pose serious security threats. UKM addresses these challenges effectively, ensuring both security and compliance for its users. Additionally, its ability to streamline key management processes allows organizations to focus more on their core operations instead of getting bogged down by key-related issues.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM z/OS

Integrations

IBM z/OS

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Rocket Software

Founded

1990

Country

United States

Website

www.rocketsoftware.com/en-us/products/z-assure-vulnerability-analysis-program

Vendor Details

Company Name

Software Diversified Services

Founded

1982

Country

United States

Website

www.sdsusa.com/security-software/universal-ssh-key-manager/

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Alternatives

PT Application Inspector Reviews

PT Application Inspector

Positive Technologies
CA Cleanup Reviews

CA Cleanup

Broadcom