Who knows more about protecting zSystems than zSystems people?

Verifies mainframe security policies and security compliance

zSecure Audit helps you extend and enrich the existing Z Systems security (IBM RACF, CA ACF2, or CA Top Secret) by enforcing and enhancing security policies in repeatable, sustainable, and automated fashion. These automated reports also help you quickly locate vulnerabilities and compliance issues in strict security compliance environments such as for the Payment Card Industry Data Security Standard (PCI DSS), Security Technical Implementation Guide (STIG) and other similar standards

zSecure Audit can email customizable reports daily when specific events occur or when there is a potential security breach. Audit events and user access logs generated by IBM security management tools can be populated within Security Information and Event Management (SIEMs) tools such as IBM QRadar for normalization and compliance reporting.


Helps eliminate outages

Avoid needless expense with a broad coverage of audit control points and security event records. Provides an audit trail by producing overview and detailed reports about systems and users.

Delivers customized reports

Generates customizable reports when specific events occur or when there is a security breach to help quickly locate problems.

Helps minimize security risks by driving network vulnerability assessments

Uses data analytics to detect system changes to help minimize security risks. Identifies changes in members of partitioned data sets and indicates whether a member was added, deleted, or changed.

Gathers and analyzes critical information including security compliance

Allows you to access live security data on mainframes running external security managers (ESM) IBM RACF, CA ACF2 or CA Top Secret, delivering up-to-the-minute audit accuracy.

Key Features

  • Automated detection of security exposure or misconfigurations
  • Customizable reports
  • Modernize with IBM Cloud Pak for Security (Unified Console)
  • Event collection from multiple event-collection providers
  • Integration with SIEMs including QRadar
  • Extensive coverage of SMF records