ACF2 vs Imperva SecureSphere Database Security comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
83 views|50 comparisons
100% willing to recommend
Imperva Logo
5,042 views|3,133 comparisons
92% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ACF2 and Imperva SecureSphere Database Security based on real PeerSpot user reviews.

Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security.
To learn more, read our detailed Database Security Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Excellent real-time reporting that saves time and resources.""Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience.""We use this tool to quickly assign privileges to different users as soon as they come in.""The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand.""I love their support. The support is great. They are number one."

More ACF2 Pros →

"Flexible reporting allows for customization that keeps the admins from having to interact with system automation.""This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks.""The integration is great.""The most valuable feature of this solution is the database security policy.""The technical support for Imperva is super, super, super.""The integration with CounterBreach is great.""As we are very sensitive to financial impacts, this product provides great protection for our organization.""The discovery module provides good visibility."

More Imperva SecureSphere Database Security Pros →

Cons
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​""It needs longer rules. The max rule is 32K.""Reporting can sometimes include false positives.""They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."

More ACF2 Cons →

"Once we read the activity logs on the platform, we cannot open them anywhere else as they are stored in a proprietary format.""SecureSphere activity log can be used with Imperva CounterBreach in an effort to protect enterprise data from theft and loss caused.""The solution could improve by having more integration.""The solution needs local support.""Reporting could be improved.""The GUI for this solution could use some improvement.""I would like to see improvement in the integration part of the tool. This should be an easy process.""The interface is not user-friendly."

More Imperva SecureSphere Database Security Cons →

Pricing and Cost Advice
Information Not Available
  • "The cost of support for this solution is very expensive."
  • "Licensing fees are on a yearly basis, and it is a good value for the money."
  • "There is an annual licensing fee for upgrading the device."
  • "Pricing is low and scalable to add features and volume."
  • "The pricing over-all depends on the entry level. For example, if support and maintenance are about $20,000 - $25,000, the initial cost can be five times more. It is less expensive for the company to maintain the client than to make the deployment."
  • "We have all the licenses, which we pay for annually. The price is a little high, but the product is good."
  • "They have introduced new price models, which makes the product more affordable now."
  • "The price is very high but compared to the price of the overall solution, then I think it's a good deal because the solution itself is great."
  • More Imperva SecureSphere Database Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Database Security solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:A set length of 12 characters can ensure the safety of a system. Longer passwords provide an added layer of security, especially when combined with other password complexity requirements. With a… more »
    Top Answer:ACF2 can be suitable for beginners with the right guidance and support. While it may have a steep learning curve for many due to its complexity, it offers extensive documentation and resources that… more »
    Top Answer:ACF2's reporting capabilities are highly valuable. It offers various predefined reports that provide insights into our system's security posture. These reports include information on user access… more »
    Top Answer:IBM Security Guardium Data Protection is a solution for database security from IBM that gives complete visibility, control, and analysis to secure sensitive data and comply with regulations IBM… more »
    Top Answer:The tool's pricing is flexible and affordable for small and medium enterprises.
    Ranking
    17th
    out of 22 in Database Security
    Views
    83
    Comparisons
    50
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    2nd
    out of 22 in Database Security
    Views
    5,042
    Comparisons
    3,133
    Reviews
    11
    Average Words per Review
    433
    Rating
    8.2
    Comparisons
    Also Known As
    CA ACF2
    Learn More
    Overview

    CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

    ACF2 Features

    ACF2 offers some of the following features:

    • Authentication: ACF2 is used for authenticating users and granting them access to profiles and various resources on the mainframe.

    • Access Control: The solution provides resource control, allowing administrators to control who can access specific mainframe resources.

    • Logging and Monitoring: Organizations can easily track and monitor activities on the mainframe. This feature enables the creation of audit trails for follow-up and helps with security analysis.

    • Metrics and Reporting: ACF2 allows the configuration of tools to produce different types of metrics and reports. These can then be used by senior management for making informed security decisions.

    • Comprehensive Security: The solution provides comprehensive security for mainframe environments, ensuring the protection of valuable data assets. It offers advanced authentication, system entry validation, and administrative control.

    • Streamlined Administration: It simplifies the administration of mainframe security by providing streamlined management capabilities. ACF2 also enables administrators to monitor and adjust security policies and accommodate various organizational structures.

    • Scalability: ACF2 offers reliable and scalable security, allowing businesses to expand their mainframe environments while maintaining a high level of protection.

    • Compliance Management: Organizations can meet compliance requirements by providing auditability, accountability, and comprehensive security controls.

    • Integration: ACF2 can integrate with distributed security solutions from CA Technologies, providing enterprise-class security and compliance management for mobile-to-mainframe environments.

    • Flexibility: ACF2 allows flexibility in adapting security policies to accommodate different organizational structures and requirements.

    ACF2 Benefits

    Some of the benefits that ACF2 provides are:

    • Enhanced security and resilience

    • Streamlined administration

    • Reliable and scalable security

    • Comprehensive audit capabilities

    • Cost-effectiveness

    • Integration with other security solutions

    • Simplified identity and access management

    • Compliance management

    • Efficient monitoring and reporting

    Reviews from Real Users

    According to an IT Examiner at a financial services firm with 10,000+ employees, "ACF2 is extremely beneficial for the mainframe environment, and it is at the forefront for security and resilience."

    Imperva SecureSphere Database Security:

    • Audits all access to sensitive data.
    • Alerts or blocks database attacks and unauthorized activities, in real time.
    • Detects and virtually patches database vulnerabilities.
    • Identifies excessive user rights and dormant users, and enables a complete rights review cycle.
    • Accelerates incident response and forensics investigations with advanced analytics.
    Sample Customers
    Sky, Rogers Communications
    BlueCross BlueShield, eHarmony, EMF Broadcasting, GE Healthcare, Metro Bank, The Motley Fool, Siemens
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm40%
    Manufacturing Company11%
    Government9%
    Computer Software Company9%
    REVIEWERS
    Financial Services Firm44%
    Comms Service Provider19%
    Media Company11%
    Energy/Utilities Company7%
    VISITORS READING REVIEWS
    Financial Services Firm26%
    Computer Software Company12%
    Government9%
    Insurance Company7%
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise14%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business12%
    Midsize Enterprise8%
    Large Enterprise80%
    REVIEWERS
    Small Business36%
    Midsize Enterprise15%
    Large Enterprise49%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise16%
    Large Enterprise68%
    Buyer's Guide
    Database Security
    March 2024
    Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    ACF2 is ranked 17th in Database Security while Imperva SecureSphere Database Security is ranked 2nd in Database Security with 52 reviews. ACF2 is rated 9.0, while Imperva SecureSphere Database Security is rated 8.2. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of Imperva SecureSphere Database Security writes "The fine-grained auditing available on the platform makes life easier and helps explain anything happening in your database". ACF2 is most compared with IBM Resource Access Control Facility, Top Secret and IBM Security zSecure, whereas Imperva SecureSphere Database Security is most compared with IBM Security Guardium Data Protection, Oracle Audit Vault, DataSunrise Database Security, Trustwave DbProtect and jSonar.

    See our list of best Database Security vendors.

    We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.