CA ACF2 Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
Real User
Chief Strategist at Mainframe analytics
Dec 04 2016

What is most valuable?

This product provides excellent quality for security in the mainframe environment.

How has it helped my organization?

Basically, it ensures that data is handled only by those who should be handling it and only in the way that they should be handling it. This product provides visibility and security as to how the data is being used.

What needs improvement?

There is always room for improvement in this product. If possible, I would recommend to have an Eclipse interface which can provide simplicity in programmable access. This will help in putting together more flexible solutions that interact... more»
Consultant
Project Manager at a tech services company with 1,001-5,000 employees
Jan 08 2017

What is most valuable?

The most valuable feature is strict and reliable access control to CICS Resources. Valid access is positive; a block is a genuine block.

How has it helped my organization?

ACF2 provides us with compliance with SOX controls and full evidence of SoD adherence.

What needs improvement?

LIDs based on names are rapidly becoming useable. A primary key based on SSO IDs is preferred for LIDs in the UID string. This will also serve as a primary (and secure) key to owners of personal accounts. Functional and service accounts... more»
Find out what your peers are saying about CA Technologies, IBM, Syncsort and others in Mainframe Security.
283,354 professionals have used our research since 2012.
Real User
Security Analyst
Dec 31 2017

What is most valuable?

One of the values in this industry is how it manages user security. We use this tool to quickly assign privileges to different users as soon as they come in. As soon as we onboard the users, we use CA ACF to assign privileges and assign rules to all the users. When the rule changes, we use CA ACF to change the rules or deprovision them from those rules and... more»

What needs improvement?

I would like to see browser support whereby we can work from our desktops instead of using the mainframe tool called 3270. I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.
Real User
Technical Architect at a healthcare company with 1,001-5,000 employees
Jan 31 2018

What is most valuable?

* The level of protection that ACF2 provides. * The NOACCESS by default is another very good feature. * Access rules are straightforward, and easy to understand.

How has it helped my organization?

By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access. It also helps us keep unauthorized users from accessing PHI or PII data.

What needs improvement?

It needs longer rules. The max rule is 32K. It would be nice if the rules could be moved above the bar, which would allow for longer rules.

Articles

User Assessments By Topic About CA ACF2

Find out what your peers are saying about CA Technologies, IBM, Syncsort and others in Mainframe Security.
283,354 professionals have used our research since 2012.

CA ACF2 Questions

CA ACF2 Projects By Members

CA ACF2 Consultants

What is CA ACF2?

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

BUYER'S GUIDE
Not sure which Mainframe Security solution is right for you?

Download our free Mainframe Security Report and find out what your peers are saying about CA Technologies, IBM, Syncsort, and more!

Sign Up with Email