Mainframe software directory - Security Management

Return to software directory index

Page 1  Next page

Security Management Software

Access Manager
Company:
Macro 4
Access Manager provides automated control and management of interactive users on one or more System i processors.

Administrator
Company:
Vanguard
Administrator - offers the widest range of administration, data mining, and reporting tools available today to simplify and enhance security management functions on systems running IBM's Security Server™ (RACF®).

Advisor
Company:
Vanguard
Advisor - offers the most comprehensive event detection, analysis and reporting package for the mainframe environment.

Analyzer
Company:
Vanguard
Analyzer - a comprehensive system integrity verification and auditing solution provides assessment, risk identification, threat analysis, and specific instructions on how to fix identified problems.

AutoSwap
Company:
EMC
EMC AutoSwap transparently moves application workload from disks in one Symmetrix subsystem to disks in another-or within the same Symmetrix-with no disruption to operations. With AutoSwap, z/OS and OS/390 mainframe users gain an additional level of availability to protect applications during both planned and unplanned outages.

CA Access Control
Company:
CA
eTrust Access Control provides the critical layer of security protection for your organization's servers. With support for a range of environments including Unix, Linux, Linux on Mainframe and Windows, eTrust Access Control provides the breadth of coverage to protect your entire enterprise. Fine-grained management allows you to limit user privileges to the minimal set necessary for their job function, including those of the superuser.

CA ACF2
Company:
CA
eTrust CA-ACF2 enables you to take full advantage of the reliability, scalability, and cost-effectiveness of the mainframe by providing leading-edge security for the z/OS, OS/390 and VM business transaction environments, including UNIX system services and mainframe Linux.

CA Cleanup
Company:
CA
eTrust Cleanup is easily automated to provide automatic ongoing and comprehensive cleanup of security files. eTrust Cleanup identifies and removes entitlements and user IDs once unreferenced beyond a specified threshold.

CA Unicenter Advanced Systems Management
Company:
CA
Unicenter Advanced Systems Management enables you to optimize your IT investment by continuously assessing and self managing system resources and services. This solution provides a centralized mechanism for management and dynamic resource brokering of complex environments that include clusters and virtualized platforms.

CopyCross
Company:
EMC
EMC AutoSwap transparently moves application workload from disks in one Symmetrix subsystem to disks in another-or within the same Symmetrix-with no disruption to operations. With AutoSwap, z/OS and OS/390 mainframe users gain an additional level of availability to protect applications during both planned and unplanned outages.

CopyCrypt
Company:
Rocket Software
CopyCrypt protects sensitive information in compliance with government regulations (HIPAA, Sarbanes-Oxley, GLBA, etc.) by encrypting critical data during the backup process using non-proprietary, open source encryption algorithms such as DES, 3DES, and AES - the official US government standard.

DEF
Company:
Applied Software
DEF®, the user friendly means to cost efficient data encryption. Encryption places the security challenge and control with the people responsible for the creation and use of sensitive data. No privileged functions are available for systems programmers or operators. And the encryption key is never stored in the computer system or within the encrypted data itself. Instead, words and phrases up to 255 characters in length may be used as keys, making them easier to remember... and to use. To ensure a user friendly environment, DEF®, provides Batch, Interactive (TSO) and FSE (Applied Software's Full-Screen Editor) encryption and decryption interfaces. Extensive Assembler language subroutines provide DEF®, functions to higher level languages such as COBOL, FORTRAN and PL/I. Online and database applications may easily interface with DEF®, . Well documented program examples in COBOL, PL/I and FORTRAN which call DEF®, subroutines are provided. No system generation (SYSGEN) or new hardware is required. And there is no additional overhead for non-encrypted data. Compared with restrictive access software products (which do not encrypt data) , DEF®, is much more secure, more user-friendly and easier to manage... finally, the ultimate in data security in a form business and government can use.

E-HelpDesk
Company:
EKC
Provides synchronization across all mainframe security systems to keep user's password in synch. Automates the basic processes of password resetting that normally require a call to a Security Support or Help Desk facility.

EKC Product Facilities
Company:
EKC
Extra functionality enhancing the EKC Product experience - at no extra cost.

Enforcer
Company:
Vanguard
Enforcer - a proven, state-of-the-art intrusion management solution on today's mainframe, Enforcer protects critical data and other resources by ensuring that the standards, policies, rules and settings defined by an organization's security and compliance experts are in force and stay that way.

E-PAL
Company:
EKC
E-PAL - Special Access Assignment

ERQ
Company:
ASPG - Advanced Software Products Group
ERQ is an automated RACF administration & reporting utility that is simple, powerful, and best of all, inexpensive! ERQ is ISPF driven. With the push of a key, reports may be produced, RACF commands may be automatically generated, and 'clean-up' tasks may be streamlined - with little or no training necessary. Extensive field help messages guide the user through the product. In Addition, ERQ enables RACF analysts to create their own custom RACF applications using a set of straightforward ISPF services.

E-SME
Company:
EKC
Enterprise programming interface to provide remote administration of CA-ACF2 and IBM RACF users through desktop applications. TCP/IP communications are encrypted and coded to insure that only authorized applications may access the enterprise even over a non-secure connection.

E-SRF
Company:
EKC
A comprehensive security analysis and reporting tool designed to provide critical security information. This product addresses the reporting needs of Security Administrators, Auditors, and the people who are responsible for both the resources being protected and the users who are accessing these resources. Features two powerful capabilities: Event Reporting (what happened) and Access Analysis (what can happen).

ETF/A
Company:
EKC
Enhances productivity and speeds ACF2 administration, rule change management, security file maintenance and recovery as extensions to ACF2. Among ETF/A's many powerful features is our Emergency Access "Firecall," which addresses the issue of "How do I control access under emergency situations and still retain oversight and control?"

ETF/R
Company:
EKC
The only integrated facility which provides predefined emergency firecall access on demand to resources managed by IBM's RACF security system. Administrators can control the amount of access users may acquire and ensure SMF logging of all accesses granted as a result of Firecall. This feature satisfies audit requirements related to Sarbanes-Oxley and HIPAA compliance.

ez/AccessControl
Company:
Vanguard
ez/AccessControl - a groundbreaking access management solution for customers that want strong security and enhanced administration across their enterprise environment.

ez/Integrator
Company:
Vanguard
ez/Integrator - allows diverse platforms to interface and use the proven authentication, authorization and auditing capabilities of an IBM® mainframe.

ez/SignOn
Company:
Vanguard
ez/SignOn - solves registration and enrollment problems with a universal password and intrusion detection solution for multi-platform environments.

ez/Token
Company:
Vanguard
ez/Token - a two-factor authentication solution integrated with RACF® for users logging on to the mainframe.

FDRCRYPT
Company:
Innovation Data Processing
FDRenCRYPT™ is an extra-cost add-on product to the FDR family of products which provides encryption of FDR, FDRDSF and ABR full-volume, archive, application and data set backups. FDRCRYPT™ protects the data on your backups against unauthorized access by anyone who does not possess the proper encryption keys. Protection of the backup data may be required by many of today's government, industry and corporate privacy and security laws and regulations, such as HIPPA, Sarbanes-Oxley, and DOD requirements, among many others in the US and other countries.

HiT SSL Server
Company:
HiT Software
HiT SSL Server, encryption and authentication for SQL network traffic. HiT SSL Server is an all-Java, standards-based encryption and authentication server to secure SQL data flows over TCP/IP networks. It prevents unauthorized access to data by transparently enabling the Secure Sockets Layer (SSL) protocol between HiT ODBC, HiT OLEDB and HiT JDBC, and the systems where HiT SSL Server is installed. HiT SSL Server runs on any operating system running JVM 1.02 or later

I.C.U...MVS
Company:
JANUS
C.U...MVS helps you determine how someone might get around your existing controls to access data. It is a software tool that extends the capabilities of your access control package. It discovers security vulnerabilities missed (or inadvertently left unmanaged) by the access control security process. It does this quickly by analyzing the:Operating system;Access control package; and,Business data resident on the system.

IBM i Security
Company:
Enforcive
Enterprise Security is the single most comprehensive and easy to use security & compliance solution for IBM i (AS/400). It is a tool which knows how to carry out a real-time penetration attack on your computer. It can demonstrate to you a real but controlled penetration attempt of your machine from the network or internet.

IBM Tivoli Access Manager for Operating Systems
Company:
IBM
A simple-to-use, powerful security system, Tivoli® Access Manager for Operating Systems securely locks down business-critical applications, files and operating platforms to help prevent unauthorized access. This security capability blocks both insiders and outsiders from unauthorized access to and use of valuable customer, employee and business partner data.

IBM Tivoli Security Administrator for RACF
Company:
IBM
IBM Tivoli Security Administrator for RACF R1 provides a Graphical User Interface to the powerful security management functions of Resource Access Control Facility (RACF), providing an interface that's easy to use for existing RACF administrators and familiar to new RACF administrators who have previous security or directory administration experience. By including a variety of views of the RACF database, specific information is easy to find and update. In addition, the standards-based application programming interface provides access to RACF data from applications running on other platforms.

IBM z Security
Company:
Enforcive
Security for IBM Mainframe DB2 & VSAM in CICS environment. An integrated solution for management, supervision and monitoring of mainframe security functions at every level: resource, application, and data access. These products revolutionize the way security managers operate, giving them a single, comprehensive and structured way to build a secure system, regardless of the environment, application or data repository.

iCYA
Company:
Illustro
The iCYA delivers a full implementation of the Internet-standard Secure Sockets Layer (SSL) encryption technique to ensure your data traveling over the Internet or your intranet is protected. SSL encryption delivers up to 168-bit RSA certified security that ensures your data is useless in the wrong hands.

INCompliance
Company:
Vanguard
INCompliance - permits an instant overview of an organization's entire Security Server (RACF) environment with just one or two mouse clicks using a web browser.

Intersession/Menu
Company:
Astrom Software
InterSession gives all users secure, fast and convenient access to their applications. After logging on the user is presented with a menu of authorized applications. The user can select an application by entering it's name or place the cursor on it and press enter or by pressing a predefined "Hot-key".

IpBridge/Secure
Company:
Data21
IpBridge/Secure is an inexpensive middleware bridging Microsoft's IIS Web Server environment with Mainframe Web Servers to Plug-in IIS Windows based services; such as Secure Sockets Layer (SSL) and user authentication. Providing SSL encryption for Mainframe based Web applications (such as Data 21's IpServer CICS Web Server and IBM CWI).

MAS for FTP z/OS
Company:
Software Engineering GMBH
It's a must to fill the holes in Monitoring, Automation, and Security in FTP on z/OS, without using proprietory tools. FTP offers the obvious benefit of being available in the TCP/IP-stack that comes with every single operatingsystem. FTP operates according to the RFCs on each of these platforms, and has added specific SITE commands for each platform. This makes FTP a very powerful tool, but usually not used due to its weaknesses. FTP lacks monitoring, automation, and security facilities. Specifically in the z/OS domain, which has a history of tight control and security, organizations are conscious that they have to address this weakness.

MegaCryption
Company:
ASPG - Advanced Software Products Group
MegaCryption provides encryption, data integrity and digital signature functions for virtually any type of data within an OS/390 or z/OS environment. MegaCryption is a file level encryption tool that can secure FTP transmissions by keeping the data encrypted before, during and after transmission. MegaCryption contains the most flexible and complete set of cryptographic functions available on the mainframe today, allowing file processing at the point of origin, rather than having to transfer data back and forth to other systems. In addition to files being transferred off site, data stored at rest is also easily protected. Multi-platform support is offered as well as courtesy software for your business partners. MegaCryption fully complements any communication level encryption tool, can easily exploit ICSF and interoperates seamlessly with such products as PGP and GnuPG.

Paranoia 2
Company:
DISUK
The simple proven, flexible and straightford solution to removable media data protection.

PassGen
Company:
SystemWerx Limited
The PassGen technology can allow: Users to authenticate across insecure networks in a secure manner. Facilities such as terminal sessions (3270, Telnet, FTP etc.), which use clear-text passwords, can be secured.Passwords to be generated for users without knowledge of a current password value. This is useful in environments such as portals where users need to be connected to other systems without prompting user for another password.

PasswordReset
Company:
Vanguard
PasswordReset - the Enterprise-Wise solution to forgotten passwords that provides immediate payback plus long-term benefits to your company or organization. It's your "pathway to profitability."

PIE/CICS Dynamic Menus for z/OS
Company:
UNICOM Systems
PIE/CICS, Productivity Integrated Environment for z/OS / CICS Transaction Server is an integrated family of common and optional components. With PIE/CICS administrators can create user profiles extending the user sessions to 99 simultaneous applications running in separate sessions. With PIE/CICS you can build secure menus that contain multiple applications and transactions without changing existing CICS applications. When used as a CICS based application, these menus greatly simplify site navigation and shorten learning curves. Eliminate the need for the user to Sign On to each application and/or transaction. PIE/CICS seamlessly authenticates users to external security systems (RACF, CA-ACF2, CA-Top Secret) and to internal application security. PIE/CICS Single Sign On saves valuable time and reduces user frustration.

PIE/TSO Logon Director for z/OS
Company:
UNICOM Systems
The Logon Director allows PIE/CICS to log users on to TSO without requiring to enter their user IDs and passwords. The Logon Director can also save TSO passwords in encrypted form, so that PIE/CICS can use them.

RA/2
Company:
SEA
RA/2 is designed to enhance IBM's RACF security system. A data center can expand their proficiency by utilizing RA/2 to make complex and comprehensive inquiries, from one easy to use product. RA/2 is a vital component in a RACF environment. RA/2 operates in both online and batch modes to perform comprehensive cross referencing for reporting, auditing and administrative tasks. RA/2 can also be used for making mass changes/additions to the RACF database, and RA/2 uses only standard RACF commands and facilities. Here are some of RA/2's highlights.

RA/7
Company:
SEA
RA/7 is a full replacement of the IBM RACFRW. The IBM RACFRW supports only RACF Event Codes 01 to 27. OpenEdition and other new RACF events will not be reported in any future releases of RACF. Therefore IBM now provides a new SMF off-load tool called IRRADU00 which works as an exit to the IFASMFDP program. The IRRADU00 from IBM allows a user to off-load RACF SMF related data (record type 30,80,81 and 83) into a flat file. In a second step users can load these records into DB2 if desired. IBM provided in their SYS1.SAMPLIB the necessary DB2 table definitions. Most installations however cannot afford to use IRRADU00 and DB2 to view and print the required RACF information. In addition it makes very little sense to have additional databases just to report on data you will erase once used as they become very quickly obsolete.

RA/8
Company:
SEA
RA/8 automates the labor intensive process to manage RACF connect profiles. RA/8 manages the RACF profile relationships between user(s) and functional groups by using standard RACF resources. All information required by RA/8 is stored in the RACF database to ensure full data integrity.

ReACT
Company:
ASPG - Advanced Software Products Group
ReACT is a unique application designed to automate the password reset and synchronization process across the entire enterprise. Unlike other tools, ReACT eliminates the need to reset a password to a temporary value. ReACT allows the end user to reset their own password at any time without the need to change their password again at sign-on. ReACT virtually eliminates password reset related calls to the Help Desk.

Registration Manager
Company:
Vanguard
Registration Manager - helps security administrators manage and maintain ez/Signon mapped profiles throughout the enterprise. This tool makes it very easy to know which users have what IDs on what systems.

Secure / FTP
Company:
ASPG - Advanced Software Products Group
Secure/FTP provides a full audit trail of all FTP commands that were executed or attempted and offers online monitoring of all active FTP sessions including the number of bytes that are being transferred. This security solution secures your FTP commands by utilizing all 3 of the following: USERID/PASSWORD, Originating IP Address AND target FTP Server Port. Secure/FTP makes use of the standard SAF interface, allowing security officers to enter and manage their security definitions relating to FTP.

SECURITRE
Company:
Treehouse Software
An Interface between ADABAS/NATURAL and a System Security Facility (SSF), such as ACF2, Top Secret, or RACF. SECURITRE secures ADABAS at the database, file and field levels. ADABAS Utilities, NATURAL, and NATURAL Utilities are also secured.

Return to software directory index

Page 1  Next page