Who knows more about protecting zSystems than zSystems people?

Save Time and Money by Automating IT Security Management

zSecure Admin enables you to automate time-consuming IT security management tasks by quickly identifying, analyzing, and preventing problems in IBM RACF. You can also monitor privileged users to help ensure old accounts are properly deleted and products have been integrated appropriately. zSecure Admin integrates smoothly with zSecure Audit for end-to-end monitoring and remediation.

zSecure Admin can administer multiple systems with a single application interface. You can compare profiles, efficiently merge security rules from different databases, or rename IDs within the same database. When merging profiles from different databases, zSecure Admin performs extensive consistency checks and reports potential conflicts before generating commands, helping ease the burden of consolidation efforts ad compliance automation.

For network access control, zSecure Admin provides capabilities for reporting on actual usage of profiles and authorizations and relates that to the information defined in the current RACF database. This highlights profiles and authorizations use in production, exposes user-to-resource relationships, and identifies unused or obsolete profiles and authorizations in access control lists.

Automate routine tasks such as network access control

Automate recurring administrative tasks such as password resets, password authority delegation, old account management, and user, group, resource application, or database movement between systems.

Simplify management of multiple Z System Security databases

Merges security rules from different databases quickly and efficiently. Copies or moves users, groups, applications, or whole databases between systems. Keeps multiple RACF databases synchronized.

Automate database cleaning

Generates commands to clean databases. Reviews commands to confirm cleanup actions do not affect definitions that must be retained. Increases system security by removing obsolete profiles.

Key Features

  • Automation of administrative tasks such as network access control
  • Compliance automation: potential problem identification and analysis
  • Administer multiple systems
  • Quick database merger
  • RACF database usage reporting for missing or inconsistent definitions

Testimonials