Who knows more about protecting Z than Z people?

Feature spotlights

Meet the compliance demands of your industry

Apply compliance framework testing for Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI DSS) and Security Technical Implementation Guide (STIG).

Gain visibility of the ACF2 database

Use the interface to identify critical changes, differences, inconsistencies or misconfigurations promptly, that can cause security issues. The ACF2 database analyzes defined user and group IDs, datasets and resource profiles. The selected records can be output to a printable report or to an ISPF scrollable display with detailed information available on request.

Integrate with QRadar SIEM

Include the mainframe as part of enterprise-wide security monitoring. This integration helps support an effective, comprehensive security information and event management solution.

Scalable for big data systems

V2.2.1 of zSecure™ Suite products allow storage above the 2 GB boundary ("the bar") to enable processing of more data. Note that the ability to use more virtual memory can have implications for paging and real storage needs. This also frees up storage below the bar for other programs. With models z196 or higher 64-bit addressing is activated automatically, though reverting back to 31-bit addressing is optional. Select the program to run on the second panel of menu option SE.0 (SETUP RUN).

Integrates with common IBM Systems

zSecure Audit for ACF2 works with IBM z/OS®, IBM MQ for z/OS, IBM DB2®, IBM CICS®, UNIX, Linux on IBM z Systems® and CA ACF2.

Technical details

Software requirements

zSecure products, which include features for CA ACF2 and CA Top Secret, support:

  • CA ACF2 R14, R15, and R16
  • CA Top Secret R14, R15, and R16

Hardware requirements

A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.