ACF2 vs Cleanup comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

ACF2
Ranking in Database Security
17th
Ranking in Mainframe Security
4th
Average Rating
9.0
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Cleanup
Ranking in Database Security
20th
Ranking in Mainframe Security
10th
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Market share comparison

As of June 2024, in the Mainframe Security category, the market share of ACF2 is 11.1% and it decreased by 54.7% compared to the previous year. The market share of Cleanup is 5.6% and it decreased by 29.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mainframe Security
Unique Categories:
Database Security
1.6%
 

Featured Reviews

DC
Jan 13, 2022
A reliable, scalable product for security and auditing of our mainframe environment
It is a good product. It has been used for years. As long as it is configured correctly, it is a very stable product. It depends on how an institution or a company configures it. It depends on an institution's risk appetite. You need to make sure it is configured as per the concept of least privilege, and the logging features, detection and control mechanism, and other things like that are enabled. If you configure it to give access to the public, then there could be compromises. You should also have someone who independently checks it to make sure that it is configured keeping security in mind. If it has been configured for a while, when there are enhancements to the product or when you enhance it, you need to make sure that security is also looked at, and it is configured according to an institution's security policies. I would rate it a nine out of 10.
it_user350628 - PeerSpot reviewer
Nov 16, 2015
It looks forward in the database, so if it’s not showing any activity, you can get rid of that profile. But, if I give someone access to it, I can’t control the scope of what they can see.
It attempts to record the usage of profiles and resources attached to a particular user. The idea is that it looks forward in the database, so if it’s not showing any activity, you can get rid of that profile It presents problems. The problem is, if I give someone access to it, I can’t control…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
40%
Manufacturing Company
11%
Government
9%
Computer Software Company
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is a good length for a password in ACF2 so it's safe?
A set length of 12 characters can ensure the safety of a system. Longer passwords provide an added layer of security, especially when combined with other password complexity requirements. With a le...
Is ACF2 suitable for beginners?
ACF2 can be suitable for beginners with the right guidance and support. While it may have a steep learning curve for many due to its complexity, it offers extensive documentation and resources that...
What types of auditing and reporting capabilities does ACF2 offer?
ACF2's reporting capabilities are highly valuable. It offers various predefined reports that provide insights into our system's security posture. These reports include information on user access pr...
What resources can be protected and controlled using CA Cleanup?
CA Cleanup can be invaluable in controlling and protecting various resources within a company’s digital environment. Not only can users secure datasets and programs, but they also have the ability ...
What authentication methods does CA Cleanup support?
CA Cleanup can be highly versatile when it comes to authentication methods. One of the key methods it supports is digital certificates. Users can present valid digital certificates to authenticate ...
How does CA Cleanup handle user provisioning and de-provisioning?
User de-provisioning is just as important as user provisioning in maintaining a secure mainframe environment, and CA Cleanup can excel in this area. When someone in a company no longer requires acc...
 

Comparisons

No data available
 

Also Known As

CA ACF2
CA Cleanup
 

Learn More

 

Overview

 

Sample Customers

Sky, Rogers Communications
Standard Bank of South Africa
Find out what your peers are saying about IBM, Broadcom, Precisely and others in Mainframe Security. Updated: June 2024.
787,061 professionals have used our research since 2012.