ACF2 vs Informatica Persistent Data Masking comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
683 views|406 comparisons
100% willing to recommend
Informatica Logo
303 views|179 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ACF2 and Informatica Persistent Data Masking based on real PeerSpot user reviews.

Find out what your peers are saying about IBM, Broadcom, Precisely and others in Mainframe Security.
To learn more, read our detailed Mainframe Security Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Excellent real-time reporting that saves time and resources.""The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand.""Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience.""I love their support. The support is great. They are number one.""We use this tool to quickly assign privileges to different users as soon as they come in."

More ACF2 Pros →

"The most valuable feature is data discovery. This is the most exciting feature for all of the banks.""Informatica provides a comprehensive solution for on-the-fly or real-time data masking.""Informatica Persistent Data Masking can mask production data for different users, ensuring that only authorized individuals can access sensitive information.""Informatica is user-friendly, stable, and scalable. These three aspects are the most valuable for us. If we can make it work well with the CRM, we can continue or try again this year to complete that part of the project. I am confident that this kind of solution is what we need because we have a third-party resource that works in the development.""The most valuable features are the structure masking and platform masking."

More Informatica Persistent Data Masking Pros →

Cons
"It needs longer rules. The max rule is 32K.""Reporting can sometimes include false positives.""I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​""They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."

More ACF2 Cons →

"The data discovery isn't that good yet for Salesforce. We have another tool that we use for this. It may be a problem because Salesforce on the cloud.""I have encountered some issues using the substitution, which is one of the techniques of data masking.""Informatica's support understands the solution, but they lack the experience we need for our use case. That was one thing that we prioritized when we started searching for this kind of solution.""Once the data is masked, we won't be able to reverse it back to its original value.""Informatica should simplify the rules for setting classifications and user access management permissions. It's too complex to define, configure, and make work."

More Informatica Persistent Data Masking Cons →

report
Use our free recommendation engine to learn which Mainframe Security solutions are best for your needs.
768,578 professionals have used our research since 2012.
Questions from the Community
Top Answer:A set length of 12 characters can ensure the safety of a system. Longer passwords provide an added layer of security, especially when combined with other password complexity requirements. With a… more »
Top Answer:ACF2 can be suitable for beginners with the right guidance and support. While it may have a steep learning curve for many due to its complexity, it offers extensive documentation and resources that… more »
Top Answer:ACF2's reporting capabilities are highly valuable. It offers various predefined reports that provide insights into our system's security posture. These reports include information on user access… more »
Top Answer:Informatica Persistent Data Masking can mask production data for different users, ensuring that only authorized individuals can access sensitive information.
Top Answer:I think there's only one area that could be improved. Currently, when we apply the Data Masking rate, we don't have a way to view the masked data. It would be helpful if there was a feature to allow… more »
Top Answer:Test data management is a common use case. When conducting testing in lower environments, we want to avoid exposing sensitive information. To achieve this, we use Data Masking to modify the data. For… more »
Ranking
4th
out of 12 in Mainframe Security
Views
683
Comparisons
406
Reviews
0
Average Words per Review
0
Rating
N/A
6th
out of 31 in Data Masking
Views
303
Comparisons
179
Reviews
1
Average Words per Review
544
Rating
7.0
Comparisons
Also Known As
CA ACF2
Data Masking, Informatica Data Masking
Learn More
Overview

CA ACF2™ for z/OS provides innovative, comprehensive security for your business transaction environments—including Linux, UNIX and z/OS on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA ACF2 provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, and administrative control. In conjunction with distributed security solutions from CA Technologies, CA ACF2 provides mobile-to-mainframe enterprise class security and compliance management.

ACF2 Features

ACF2 offers some of the following features:

  • Authentication: ACF2 is used for authenticating users and granting them access to profiles and various resources on the mainframe.

  • Access Control: The solution provides resource control, allowing administrators to control who can access specific mainframe resources.

  • Logging and Monitoring: Organizations can easily track and monitor activities on the mainframe. This feature enables the creation of audit trails for follow-up and helps with security analysis.

  • Metrics and Reporting: ACF2 allows the configuration of tools to produce different types of metrics and reports. These can then be used by senior management for making informed security decisions.

  • Comprehensive Security: The solution provides comprehensive security for mainframe environments, ensuring the protection of valuable data assets. It offers advanced authentication, system entry validation, and administrative control.

  • Streamlined Administration: It simplifies the administration of mainframe security by providing streamlined management capabilities. ACF2 also enables administrators to monitor and adjust security policies and accommodate various organizational structures.

  • Scalability: ACF2 offers reliable and scalable security, allowing businesses to expand their mainframe environments while maintaining a high level of protection.

  • Compliance Management: Organizations can meet compliance requirements by providing auditability, accountability, and comprehensive security controls.

  • Integration: ACF2 can integrate with distributed security solutions from CA Technologies, providing enterprise-class security and compliance management for mobile-to-mainframe environments.

  • Flexibility: ACF2 allows flexibility in adapting security policies to accommodate different organizational structures and requirements.

ACF2 Benefits

Some of the benefits that ACF2 provides are:

  • Enhanced security and resilience

  • Streamlined administration

  • Reliable and scalable security

  • Comprehensive audit capabilities

  • Cost-effectiveness

  • Integration with other security solutions

  • Simplified identity and access management

  • Compliance management

  • Efficient monitoring and reporting

Reviews from Real Users

According to an IT Examiner at a financial services firm with 10,000+ employees, "ACF2 is extremely beneficial for the mainframe environment, and it is at the forefront for security and resilience."

De-identify, de-sensitize, and anonymize sensitive data from unauthorized access for application users, business intelligence, application testing, and outsourcing.

Sample Customers
Sky, Rogers Communications
Vale, Hot Telecommunication, UPMC
Top Industries
VISITORS READING REVIEWS
Financial Services Firm40%
Manufacturing Company11%
Government9%
Computer Software Company9%
VISITORS READING REVIEWS
Financial Services Firm23%
Computer Software Company13%
Government7%
Insurance Company6%
Company Size
REVIEWERS
Small Business29%
Midsize Enterprise14%
Large Enterprise57%
VISITORS READING REVIEWS
Small Business12%
Midsize Enterprise8%
Large Enterprise80%
VISITORS READING REVIEWS
Small Business19%
Midsize Enterprise11%
Large Enterprise70%
Buyer's Guide
Mainframe Security
March 2024
Find out what your peers are saying about IBM, Broadcom, Precisely and others in Mainframe Security. Updated: March 2024.
768,578 professionals have used our research since 2012.

ACF2 is ranked 4th in Mainframe Security while Informatica Persistent Data Masking is ranked 6th in Data Masking with 5 reviews. ACF2 is rated 9.0, while Informatica Persistent Data Masking is rated 7.8. The top reviewer of ACF2 writes "A reliable, scalable product for security and auditing of our mainframe environment". On the other hand, the top reviewer of Informatica Persistent Data Masking writes "Enables secure data protection during testing and controlled access to sensitive information". ACF2 is most compared with IBM Resource Access Control Facility, Top Secret and IBM Security zSecure, whereas Informatica Persistent Data Masking is most compared with Delphix, Protegrity Data Security, IBM Security Guardium Data Protection, IBM InfoSphere Optim and Imperva SecureSphere Database Security.

We monitor all Mainframe Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.