CA ACF2 Reviews

4.6 out of 5 stars
 (4)
02e629cd 0b9d 43a1 948a 4630690737ab avatar
Real User
Chief Strategist at Mainframe analytics
Dec 04 2016

What is most valuable?

This product provides excellent quality for security in the mainframe environment.

How has it helped my organization?

Basically, it ensures that data is handled only by those who should be handling it and only in the way that they should be handling it. This product provides visibility and security as to how the data is being used.

What needs improvement?

There is always room for improvement in this product. If possible, I would recommend to have an Eclipse interface which can provide simplicity in programmable access. This will help in putting together more flexible solutions that interact... more»
Dfb04c17 9e85 47f1 b87d 69d3585aa853 avatar
Real User
Project Manager at a tech consulting company with 1,001-5,000 employees
Jan 08 2017

What is most valuable?

The most valuable feature is strict and reliable access control to CICS Resources. Valid access is positive; a block is a genuine block.

How has it helped my organization?

ACF2 provides us with compliance with SOX controls and full evidence of SoD adherence.

What needs improvement?

LIDs based on names are rapidly becoming useable. A primary key based on SSO IDs is preferred for LIDs in the UID string. This will also serve as a primary (and secure) key to owners of personal accounts. Functional and service accounts... more»
Mainframe security report from it central station 2018 04 29 thumbnail
Find out what your peers are saying about CA Technologies, IBM, Syncsort and others in Mainframe Security.
269,560 professionals have used our research since 2012.
Anonymous avatar x80
Real User
Security Analyst
Dec 31 2017

What is most valuable?

One of the values in this industry is how it manages user security. We use this tool to quickly assign privileges to different users as soon as they come in. As soon as we onboard the users, we use CA ACF to assign privileges and assign rules to all the users. When the rule changes, we use CA ACF to change the rules or deprovision them from those rules and... more»

What needs improvement?

I would like to see browser support whereby we can work from our desktops instead of using the mainframe tool called 3270. I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.
Anonymous avatar x80
Real User
Technical Architect at a healthcare company with 1,001-5,000 employees
Jan 31 2018

What is most valuable?

* The level of protection that ACF2 provides. * The NOACCESS by default is another very good feature. * Access rules are straightforward, and easy to understand.

How has it helped my organization?

By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access. It also helps us keep unauthorized users from accessing PHI or PII data.

What needs improvement?

It needs longer rules. The max rule is 32K. It would be nice if the rules could be moved above the bar, which would allow for longer rules.

Articles

User Assessments By Topic About CA ACF2

Mainframe security report from it central station 2018 04 29 thumbnail
Find out what your peers are saying about CA Technologies, IBM, Syncsort and others in Mainframe Security.
269,560 professionals have used our research since 2012.

CA ACF2 Questions

CA ACF2 Projects By Members

CA ACF2 Consultants

What is CA ACF2?

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

Vendor 6987 screenshot 1524992460
BUYER'S GUIDE
Not sure which Mainframe Security solution is right for you?

Download our free Mainframe Security Report and find out what your peers are saying about CA Technologies, IBM, Syncsort, and more!
Mainframe security report from it central station 2018 04 29 thumbnail

Sign Up with Email