Automated detection of security exposures
Repeatable, sustainable and automated process for auditing and reporting helps you be prepared for audits without having to gather the necessary information yourself. zSecure™ Audit for Top Secret helps you extend and enrich security by enforcing and enhancing security policies. Automatically generated reports in standard format help you to quickly locate problems, providing vulnerability analysis of your mainframe. You can reduce errors and improve overall quality of service.
Event collection from many products
Automated compliance framework testing and enhanced reporting capabilities for Payment Card Industry Data Security Standard (PCI DSS), Security Technical Implementation Guide (STIG), GSD331, Sarbanes-Oxley (SOX) and other standards and best practices help lower the cost of event collection from many products.
zSecure Audit for Top Secret can email reports on a daily basis when specific events occur or when there is a security breach. Extensive reporting capabilities allow you multiple customizable capabilities. The reports can also analyze the HTTP access and error log to see who is accessing or using data on the internal IT environment through the Internet.
Integration with QRadar SIEM
Audit events and user access logs generated by IBM® security management tools can be populated within QRadar® Security Information and Event Management (SIEM) for normalization and compliance reporting, harmonizing the collection infrastructure among the product lines. This integration supports an effective, comprehensive security information and event management solution.
Extensive coverage of SMF records and event reports
zSecure Audit for Top Secret offers extensive coverage of System Management Facilities (SMF) records and pre-defined event reports to enable you to report on user behavior and identify users who can circumvent system security. The CARLa Auditing and Reporting Language (CARLa) used in zSecure Audit enables you to modify the displays and reports using SMF and other data sources.
Scalability for big data systems
V2.2.1 allows storage above the 2 GB boundary ("the bar") to enable processing of more data. Note that the ability to use more virtual memory can have implications for paging and real storage needs. This also frees up storage below the bar for other programs. With models z196 or higher, 64-bit addressing is activated automatically, though reverting back to 31-bit addressing is optional. You can select the program to run on the second panel of menu option SE.0 (SETUP RUN).