ACF2 vs Fortinet FortiDB [EOL] comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
81 views|49 comparisons
100% willing to recommend
Fortinet Logo
views| comparisons
75% willing to recommend
Executive Summary

We performed a comparison between ACF2 and Fortinet FortiDB [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security.
To learn more, read our detailed Database Security Report (Updated: April 2024).
770,394 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand.""Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience.""Excellent real-time reporting that saves time and resources.""We use this tool to quickly assign privileges to different users as soon as they come in.""I love their support. The support is great. They are number one."

More ACF2 Pros →

"We use it to protect files and to prevent users from browsing them while they are being used.""The most valuable features of this solution are the security aspects.""The biggest thing, for us lately, has been their cloud tools. They're like Intercept X from Sophos, where they'll test for ransomware. Fortinet has the same sort of set up with their cloud devices. So your firewall picks up something suspicious, it sends it up to the cloud for analysis. We also have their in-house antivirus. Having different antivirus checkpoints throughout the network is a good thing as well.""It is extremely stable, and can expand as per our needs due to its stability.""The solution is very good at preventing intrusions. You can definitely rely on this solution to cover your security.""The dashboard is very simple. It has an easy to use interface."

More Fortinet FortiDB [EOL] Pros →

Cons
"It needs longer rules. The max rule is 32K.""They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud.""Reporting can sometimes include false positives.""I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​"

More ACF2 Cons →

"They need to improve the web filter to make it more user-friendly.""I'm an old-school guy. I really don't like web GUI interfaces. They're always slow and laggy and their design is restricted, whereas a binary deployment for an admin tool is always faster, easier, more flexible. I would like that kind of functionality from Fortinet.""I would like better APIs and integration with other products, like Python and SQL.""Some use case analyses could be improved.""The pricing of this solution is a little bit on the high side and can be improved.""We had some issues trying to fix some critical bugs, such as the SSL encryption."

More Fortinet FortiDB [EOL] Cons →

Pricing and Cost Advice
Information Not Available
  • "It's relatively inexpensive in comparison to everything else that has the same functionality. If you're looking at SonicWall or if you're looking at WatchGuard, their prices are about a third higher with relatively the same functionality."
  • "It is not expensive."
  • "In the licensing model, the licenses are a little bit expensive."
  • "The cost needs to be reduced."
  • "It is not costly."
  • More Fortinet FortiDB [EOL] Pricing and Cost Advice →

    Questions from the Community
    Top Answer:A set length of 12 characters can ensure the safety of a system. Longer passwords provide an added layer of security, especially when combined with other password complexity requirements. With a… more »
    Top Answer:ACF2 can be suitable for beginners with the right guidance and support. While it may have a steep learning curve for many due to its complexity, it offers extensive documentation and resources that… more »
    Top Answer:ACF2's reporting capabilities are highly valuable. It offers various predefined reports that provide insights into our system's security posture. These reports include information on user access… more »
    Ask a question

    Earn 20 points

    Ranking
    17th
    out of 22 in Database Security
    Views
    81
    Comparisons
    49
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Unranked
    In Database Security
    Buyer's Guide
    Database Security
    April 2024
    Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security. Updated: April 2024.
    770,394 professionals have used our research since 2012.
    Comparisons
    Also Known As
    CA ACF2
    FortiDB, FortiGuard Database Security
    Learn More
    Overview

    CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

    ACF2 Features

    ACF2 offers some of the following features:

    • Authentication: ACF2 is used for authenticating users and granting them access to profiles and various resources on the mainframe.

    • Access Control: The solution provides resource control, allowing administrators to control who can access specific mainframe resources.

    • Logging and Monitoring: Organizations can easily track and monitor activities on the mainframe. This feature enables the creation of audit trails for follow-up and helps with security analysis.

    • Metrics and Reporting: ACF2 allows the configuration of tools to produce different types of metrics and reports. These can then be used by senior management for making informed security decisions.

    • Comprehensive Security: The solution provides comprehensive security for mainframe environments, ensuring the protection of valuable data assets. It offers advanced authentication, system entry validation, and administrative control.

    • Streamlined Administration: It simplifies the administration of mainframe security by providing streamlined management capabilities. ACF2 also enables administrators to monitor and adjust security policies and accommodate various organizational structures.

    • Scalability: ACF2 offers reliable and scalable security, allowing businesses to expand their mainframe environments while maintaining a high level of protection.

    • Compliance Management: Organizations can meet compliance requirements by providing auditability, accountability, and comprehensive security controls.

    • Integration: ACF2 can integrate with distributed security solutions from CA Technologies, providing enterprise-class security and compliance management for mobile-to-mainframe environments.

    • Flexibility: ACF2 allows flexibility in adapting security policies to accommodate different organizational structures and requirements.

    ACF2 Benefits

    Some of the benefits that ACF2 provides are:

    • Enhanced security and resilience

    • Streamlined administration

    • Reliable and scalable security

    • Comprehensive audit capabilities

    • Cost-effectiveness

    • Integration with other security solutions

    • Simplified identity and access management

    • Compliance management

    • Efficient monitoring and reporting

    Reviews from Real Users

    According to an IT Examiner at a financial services firm with 10,000+ employees, "ACF2 is extremely beneficial for the mainframe environment, and it is at the forefront for security and resilience."

    FortiDB software is a comprehensive database security and compliance platform that helps large enterprises and cloud-based service providers protect their databases and applications from internal and external threats. Its flexible policy framework allows you to quickly and easily implement internal IT control frameworks for database activity monitoring, IT audit and regulatory compliance.

    Sample Customers
    Sky, Rogers Communications
    Chunghwa Telecom
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm40%
    Manufacturing Company11%
    Government9%
    Computer Software Company9%
    No Data Available
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise14%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business13%
    Midsize Enterprise8%
    Large Enterprise80%
    REVIEWERS
    Small Business38%
    Midsize Enterprise13%
    Large Enterprise50%
    Buyer's Guide
    Database Security
    April 2024
    Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security. Updated: April 2024.
    770,394 professionals have used our research since 2012.

    ACF2 is ranked 17th in Database Security while Fortinet FortiDB [EOL] doesn't meet the minimum requirements to be ranked in Database Security. ACF2 is rated 9.0, while Fortinet FortiDB [EOL] is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of Fortinet FortiDB [EOL] writes "The cloud tools are able to test for ransomware when the firewall picks up something suspicous". ACF2 is most compared with IBM Resource Access Control Facility and Top Secret, whereas Fortinet FortiDB [EOL] is most compared with .

    See our list of best Database Security vendors.

    We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.