CA ACF2 Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Real User
IT Examiner at a financial services firm with 5,001-10,000 employees
Jun 12 2019

What is most valuable?

The real-time reporting on the event logs is the only thing we need to use it for. The time it saves makes it very valuable to us and our allocation of resources.

How has it helped my organization?

This product makes us more efficient because of the reports it provides. Without the product, extracting this information may take us as much as several days. Instead, we can get it in real time.

What needs improvement?

Any solution that would eliminate manual intervention further is a great improvement. A solution that requires less in the form of manual processing saves more time and effort. The user access review… more»

What's my experience with pricing, setup cost, and licensing?

It is important to evaluate different products and come to an agreement among the IT staff as to what is most important before going forward with a decision and implementation. Every solution has its… more»

If you previously used a different solution, which one did you use and why did you switch?

The product has replaced a variety of other solutions. We don't make the decision to switch, it is the users' decision based on their perceived needs. If users have a change in requirements that a… more»

What other advice do I have?

I rate the product about eight out of ten considering the wealth of automated processes. Removing the need for human intervention makes the product valuable. It is only an eight and not a ten because… more»
Real User
Security Analyst
Dec 31 2017

What is most valuable?

One of the values in this industry is how it manages user security. We use this tool to quickly assign privileges to different users as soon as they come in. As soon as we onboard the users, we use CA ACF to assign privileges and assign rules to all the users. When the rule changes, we use CA ACF to change the rules or deprovision them from those rules and assign them new rules. It is done quickly… more»

What needs improvement?

I would like to see browser support whereby we can work from our desktops instead of using the mainframe tool called 3270. I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.

What other advice do I have?

Know that this tool is a great tool. It is a good tool to use. You can quickly automate, quickly provision, and deprovision new users, which is essential when you are bringing new people onboard. We have people coming and going all the time. So, you need a tool like this. CA ACF has a similar tool that we are trying to adopt, by the way, which would help us to quickly assign rules to users and… more»
Find out what your peers are saying about CA ACF2 vs. CA Top Secret and other solutions. Updated: September 2019.
371,639 professionals have used our research since 2012.
Real User
Technical Architect at a healthcare company with 10,001+ employees
Jan 31 2018

What is most valuable?

* The level of protection that ACF2 provides. * The NOACCESS by default is another very good feature. * Access rules are straightforward, and easy to understand.

How has it helped my organization?

By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access. It also helps us keep unauthorized users from accessing PHI or PII data.

What needs improvement?

It needs longer rules. The max rule is 32K. It would be nice if the rules could be moved above the bar, which would allow for longer rules.

If you previously used a different solution, which one did you use and why did you switch?

We purchased a company that was running another security product. We converted that system to ACF2. On our systems, we have always been an ACF2 shop. Back in the 1980s when all mainframe shops were installing some type of security software… more»

What other advice do I have?

ACF2 was installed here in 1985, probably because MVS security, at that time, was very limited.

Articles

User Assessments By Topic About CA ACF2

Find out what your peers are saying about CA ACF2 vs. CA Top Secret and other solutions. Updated: September 2019.
371,639 professionals have used our research since 2012.

CA ACF2 Questions

What is CA ACF2?

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

Sign Up with Email