ACF2 Valuable Features
DC
reviewer1077621
IT Examiner at a financial services firm with 10,001+ employees
Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience.
View full review »PM
Patrick Mondoy
Project Manager at a tech services company with 10,001+ employees
The most valuable feature is strict and reliable access control to CICS Resources. Valid access is positive; a block is a genuine block.
View full review »DC
reviewer1077621
IT Examiner at a financial services firm with 10,001+ employees
The real-time reporting on the event logs is the only thing we need to use it for. The time it saves makes it very valuable to us and our allocation of resources.
View full review »Buyer's Guide
Mainframe Security
March 2024
Find out what your peers are saying about Broadcom, IBM, Precisely and others in Mainframe Security. Updated: March 2024.
768,246 professionals have used our research since 2012.
This product provides excellent quality for security in the mainframe environment.
View full review »- The level of protection that ACF2 provides.
- The NOACCESS by default is another very good feature.
- Access rules are straightforward, and easy to understand.
One of the values in this industry is how it manages user security. We use this tool to quickly assign privileges to different users as soon as they come in. As soon as we onboard the users, we use CA ACF to assign privileges and assign rules to all the users. When the rule changes, we use CA ACF to change the rules or deprovision them from those rules and assign them new rules. It is done quickly and almost automatically.
View full review »Buyer's Guide
Mainframe Security
March 2024
Find out what your peers are saying about Broadcom, IBM, Precisely and others in Mainframe Security. Updated: March 2024.
768,246 professionals have used our research since 2012.