Compare CA ACF2 vs. Imperva SecureSphere Database Security

CA ACF2 is ranked 6th in Database Security with 3 reviews while Imperva SecureSphere Database Security is ranked 2nd in Database Security with 9 reviews. CA ACF2 is rated 8.6, while Imperva SecureSphere Database Security is rated 8.2. The top reviewer of CA ACF2 writes "Saves resources through fully automated reporting". On the other hand, the top reviewer of Imperva SecureSphere Database Security writes "Assesses the vulnerability of the database while it is running". CA ACF2 is most compared with IBM Resource Access Control Facility, CA Top Secret and IBM Security zSecure, whereas Imperva SecureSphere Database Security is most compared with IBM Guardium Data Protection, Oracle Audit Vault and Fortinet FortiDB. See our CA ACF2 vs. Imperva SecureSphere Database Security report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CA ACF2 vs. Imperva SecureSphere Database Security and other solutions. Updated: November 2019.
377,029 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Excellent real-time reporting that saves time and resources.The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand.We use this tool to quickly assign privileges to different users as soon as they come in.I love their support. The support is great. They are number one.

Read more »

As we are very sensitive to financial impacts, this product provides great protection for our organization.The most valuable feature is the Data Masking.Flexible reporting allows for customization that keeps the admins from having to interact with system automation.A solution which does what other name brand products do for a lower cost.This solution has helped secure our Internet-based services, protecting us against DoS and other types of web-based attacks.The most valuable feature of this solution is the database security policy.The functionality is very useable and easy to understand.It has a lot of different components that cover the needs of our customers.

Read more »

Cons
Reporting can sometimes include false positives.It needs longer rules. The max rule is 32K.I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.‚Äč

Read more »

I would like to see improvement in the integration part of the tool. This should be an easy process.The firewall features are not very strong and should be improved.Performance can be slow under heavy loads, but this should be adjusted by scaling.The interface is not user-friendly.The GUI for this solution could use some improvement.Technical support for this solution needs improvement.It would be better to update the solution by using a GUI that guides me, rather than through a CLI.Integration with other databases or third-party products would be useful.

Read more »

Pricing and Cost Advice
Information Not Available
We have all the licenses, which we pay for annually. The price is a little high, but the product is good.The pricing over-all depends on the entry level. For example, if support and maintenance are about $20,000 - $25,000, the initial cost can be five times more. It is less expensive for the company to maintain the client than to make the deployment.Pricing is low and scalable to add features and volume.There is an annual licensing fee for upgrading the device.Licensing fees are on a yearly basis, and it is a good value for the money.The cost of support for this solution is very expensive.

Read more »

report
Use our free recommendation engine to learn which Database Security solutions are best for your needs.
377,029 professionals have used our research since 2012.
Ranking
6th
out of 17 in Database Security
Views
1,018
Comparisons
608
Reviews
3
Average Words per Review
397
Avg. Rating
8.7
2nd
out of 17 in Database Security
Views
9,459
Comparisons
5,789
Reviews
8
Average Words per Review
666
Avg. Rating
8.3
Top Comparisons
Compared 30% of the time.
Compared 8% of the time.
Learn
CA (A Broadcom Company)
Imperva
Overview

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

Imperva SecureSphere Database Security:

  • Audits all access to sensitive data.
  • Alerts or blocks database attacks and unauthorized activities, in real time.
  • Detects and virtually patches database vulnerabilities.
  • Identifies excessive user rights and dormant users, and enables a complete rights review cycle.
  • Accelerates incident response and forensics investigations with advanced analytics.
Offer
Learn more about CA ACF2
Learn more about Imperva SecureSphere Database Security
Sample Customers
Information Not Available
BlueCross BlueShield, eHarmony, EMF Broadcasting, GE Healthcare, Metro Bank, The Motley Fool, Siemens
Top Industries
No Data Available
REVIEWERS
Financial Services Firm43%
Government14%
Energy/Utilities Company14%
International Affairs Institute7%
VISITORS READING REVIEWS
Software R&D Company25%
Financial Services Firm17%
Comms Service Provider10%
Retailer6%
Company Size
No Data Available
REVIEWERS
Small Business18%
Midsize Enterprise21%
Large Enterprise61%
VISITORS READING REVIEWS
Small Business26%
Midsize Enterprise13%
Large Enterprise60%
Find out what your peers are saying about CA ACF2 vs. Imperva SecureSphere Database Security and other solutions. Updated: November 2019.
377,029 professionals have used our research since 2012.
We monitor all Database Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email