CA ACF2 Overview

CA ACF2 is the #1 ranked solution in our list of top Mainframe Security tools. It is most often compared to IBM Resource Access Control Facility: CA ACF2 vs IBM Resource Access Control Facility

What is CA ACF2?

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

CA ACF2 Customers

Sky, Rogers Communications

CA ACF2 Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
it_user811302
Technical Architect at a healthcare company with 10,001+ employees
Real User
Jan 31, 2018
Allows us to maintain tight controls on dataset and system access

What is our primary use case?

To provide security for the z/OS operating system.

Pros and Cons

  • "The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
  • "It needs longer rules. The max rule is 32K."

What other advice do I have?

ACF2 was installed here in 1985, probably because MVS security, at that time, was very limited.
it_user779265
Security Analyst
Real User
Dec 31, 2017
We use this tool to quickly assign privileges to different users as soon as they come in

What is our primary use case?

We use CA ACF to manage security, provision users, and deprovision users from mainframe applications.

Pros and Cons

  • "We use this tool to quickly assign privileges to different users as soon as they come in."
  • "I love their support. The support is great. They are number one."
  • "I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​"

What other advice do I have?

Know that this tool is a great tool. It is a good tool to use. You can quickly automate, quickly provision, and deprovision new users, which is essential when you are bringing new people onboard. We have people coming and going all the time. So, you need a tool like this. CA ACF has a similar tool that we are trying to adopt, by the way, which would help us to quickly assign rules to users and remove rules from users.
Patrick Mondoy
Project Manager at a tech services company with 10,001+ employees
Consultant
Leaderboard
Jan 8, 2017
Provides compliance with SOX controls and full evidence of SoD adherence.

What other advice do I have?

Capture your intentions as requirements and do not lose the requirements. Test the resulting implementation to confirm it meets requirements as documented. Any changes based on test-driven development need to be properly documented and approved.
it_user558519
Chief Strategist at Mainframe analytics
Vendor
Dec 4, 2016
This product ensures that data is handled only by those who should be handling it and only in the way that they should be handling it.

What other advice do I have?

Make sure that your people are well trained so that they understand the product properly, before they implement it. Reliability, responsiveness and quality are important criterias to look for when selecting a vendor.
Quick Links