How zSecure aids compliance and simplifies administration

Meet industry and regulatory compliance demands

Gain compliance framework testing for Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI DSS) and Security Technical Implementation Guide (STIG). Monitor privileged users to detect compliance violations and insider abuse. Block and correct noncompliant and miscoded IBM® RACF® commands as they are being issued to help maintain strong controls and the availability of systems.

Automate auditing and compliance reporting

Replace manual audits with automated analysis, while you synchronize and cleanup databases using predefined reports. Help avoid problems with automated change management to comply with policies. Track and monitor baseline security and library changes. Analyze all your activity to help detect, prioritize and remediate security exposures.

Improve support for IBM RACF databases

Use a single point of control to route commands and reports to many systems, improving efficiency and synchronization. Provide an offline RACF database for simulating security changes without affecting production. Delegate and decentralize administration tasks to less skilled resources.

Analyze security event activity

Integrate security event information from critical IBM® z/OS® subsystems and applications including: IBM MQ for z/OS, IBM DB2® , IBM CICS® , IBM IMS™, IBM z/OS Communications Server (TCP/IP), UNIX, Linux on IBM z Systems®, IBM RACF, CA ACF2 and CA Top Secret Security. Integrate and consolidate a broad range of security relevant events provided to IBM Security QRadar® (SIEM) and other security information and event management (SIEM) products for analysis, dashboard monitoring and reporting.

Integrates with common IBM systems

zSecure™ Compliance and Adminstration is accessible with IBM Security QRadar SIEM, IBM Security Guardium®, RACF and IBM MFA solutions.

Scalability for big data systems

V2.2.1 allows storage above the 2 GB boundary ("the bar") to enable processing of more data. Note that the ability to use more virtual memory can have implications for paging and real storage needs. This also frees up storage below the bar for other programs. With models (z196 or higher), 64-bit addressing is activated automatically, though reverting back to 31-bit addressing is optional. You can select the program to run on the second panel of menu option SE.0 (SETUP RUN) in ISPF UI.

Technical details

Software requirements

Requirements: A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later.

    Hardware requirements

    A supported IBM z Systems server that is capable of supporting z/OS V2.1, or later. Minimum and recommended processor, disk space, and memory requirements for zSecure suite V2.1.1 and zSecure Compliance and Administration V2.1.1, zSecure Compliance and Auditing V2.1.1, and zSecure Administration V2.1.1 solutions.

    • Processor: Z800 (Minimum); IBM System z9 or z10 Enterprise Class (EC) (recommended)
    • Disk space: 300 MB (minimum); 450 MB (recommended)
    • Memory: 1 GB (minimum); 2 GB (recommended)

    Technical specifications

    zSecure V2.2.1 also updates currency with products, applications, and standards to include:

    • CA ACF2 and CA Top Secret
    • IBM MQ
    • IBM Integrated Cryptographic Service Facility (ICSF)
    • Windows server
    • Payment Card Industry-Data Security Standard (PCI-DSS)
    • Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs)