CA ACF2 Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Real User
IT Examiner at a financial services firm with 5,001-10,000 employees
Jun 12 2019

What is most valuable?

The real-time reporting on the event logs is the only thing we need to use it for. The time it saves makes it very valuable to us and our allocation of resources.

How has it helped my organization?

This product makes us more efficient because of the reports it provides. Without the product, extracting this information may take us as much as several days. Instead, we can get it in real time.

What needs improvement?

Any solution that would eliminate manual intervention further is a great improvement. A solution that requires less in the form of manual processing saves more time and effort. The user access review… more»

What's my experience with pricing, setup cost, and licensing?

It is important to evaluate different products and come to an agreement among the IT staff as to what is most important before going forward with a decision and implementation. Every solution has its… more»

Which solution did I use previously and why did I switch?

The product has replaced a variety of other solutions. We don't make the decision to switch, it is the users' decision based on their perceived needs. If users have a change in requirements that a… more»

What other advice do I have?

I rate the product about eight out of ten considering the wealth of automated processes. Removing the need for human intervention makes the product valuable. It is only an eight and not a ten because… more»
Real User
Technical Architect at a healthcare company with 10,001+ employees
Jan 31 2018

What is most valuable?

* The level of protection that ACF2 provides. * The NOACCESS by default is another very good feature. * Access rules are straightforward, and easy to understand.

How has it helped my organization?

By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access. It also helps us keep unauthorized users from accessing PHI or PII data.

What needs improvement?

It needs longer rules. The max rule is 32K. It would be nice if the rules could be moved above the bar, which would allow for longer rules.

Which solution did I use previously and why did I switch?

We purchased a company that was running another security product. We converted that system to ACF2. On our systems, we have always been an ACF2 shop. Back in the 1980s when all mainframe shops were installing some type of security software… more»

What other advice do I have?

ACF2 was installed here in 1985, probably because MVS security, at that time, was very limited.

Articles

User Assessments By Topic About CA ACF2

Find out what your peers are saying about CA ACF2 vs. CA Top Secret and other solutions. Updated: January 2020.
391,932 professionals have used our research since 2012.

CA ACF2 Questions

What is CA ACF2?

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.