OPS/MVS Automation Intelligence vs Top Secret comparison

Cancel
You must select at least 2 products to compare!
Broadcom Logo
155 views|115 comparisons
96% willing to recommend
Broadcom Logo
735 views|515 comparisons
100% willing to recommend
Executive Summary

We performed a comparison between OPS/MVS Automation Intelligence and Top Secret based on real PeerSpot user reviews.

Find out what your peers are saying about BMC, ServiceNow, Microsoft and others in Event Monitoring.
To learn more, read our detailed Event Monitoring Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"​The follow-up surprised me. Making sure that I am happy with what I have gone to them on. They will call after I have made changes and verify that I am happy with the changes that I did have to make. If it did not fix the complete problem, they go back over it until I am satisfied.​""If something breaks and it goes down when it's not supposed to, automation brings it right back up.""It alerts the operators when it is time to repair the communications and the IPLs.""I can and interrupt what's going on, bring a job down if I need to, and bring it back up.""Their technical support is incredible, immediately responsive, and even if it is not updated to Level 2 support sometimes, they chip in providing more detailed answers and options to fix the problem.""Once automatic IPL has been defined, anyone can perform an IPL with very little intervention. We know that all of the components will be started correctly.""The documentation is simple, easy to follow, and use. A limited, first-time systems programmer can do it, in that it is out-of-the-box almost functional.""OPS/REXX is valuable because it allows us almost unlimited flexibility in automating our system."

More OPS/MVS Automation Intelligence Pros →

"We have implemented two-factor authentication, which is a new piece of CA Top Secret."

More Top Secret Pros →

Cons
"​It’s a complex product. The initial installation is easy, but implementing various functions is a constant process.​""Performing a stop/restart of OPS/MVS could be a little smoother. Without special coding, some undesired tasks will be started and some necessary tasks will be stopped if we have to bounce OPS/MVS during the day.""The reason sometimes it is not stable, we do not have the expertise to write the script.​""It definitely needs more web-based interface, to be more mobile-open. More APIs, more open source to it.""Scalability is zero. It cannot be scaled because of its age.""The interfaces to USS, CA UIM could be better. CA Common Services interfaces - namely Zdata Mover, Zmessage Service, Zdatacolletcor - are poorly documented.""Some of the command sequences are too long.""The further expansion of the mainframe teamcenter interface. Also, the web services support is something that I am looking into."

More OPS/MVS Automation Intelligence Cons →

"The user interface could be improved. Sometimes, it is not simple to understand where a certain definition should be defined, and I go through a number of screens until I find where to do some of them.""It would be helpful if they removed limitations on user record sizes.""Make sure that there is a post-sale department in your country. We have experienced some post-sale problems to do with integration of CA products into our systems."

More Top Secret Cons →

Questions from the Community
Ask a question

Earn 20 points

Top Answer:Top Secret is a great solution that can provide you with extensive capabilities to enforce very specific access controls for mainframe resources. You can set up intricate rules and restrictions… more »
Ranking
14th
out of 20 in Event Monitoring
Views
155
Comparisons
115
Reviews
0
Average Words per Review
0
Rating
N/A
3rd
out of 12 in Mainframe Security
Views
735
Comparisons
515
Reviews
0
Average Words per Review
0
Rating
N/A
Buyer's Guide
Event Monitoring
March 2024
Find out what your peers are saying about BMC, ServiceNow, Microsoft and others in Event Monitoring. Updated: March 2024.
768,740 professionals have used our research since 2012.
Comparisons
Also Known As
CA OPS MVS Event Management and Automation, CA OPS/MVS Event Management and Automation, Unicenter CA-OPS/MVS Event Management and Automation
CA Top Secret
Learn More
Overview
z/OS, its subsystems, databases, middleware, applications, and software generate thousands of event messages daily. IT professionals need a tool to filter, prioritize, and respond quickly to these events before they impact availability and threaten business processing and associated service level agreements. CA OPS/MVS EMA automates processes, enabling you to resolve problems as they arise. It also automates more routine tasks, simplifying IT management and operations.

CA Top Secret for z/OS provides innovative, comprehensive security for your business transaction environments— including z/OS, UNIX and Linux on System z—helping you realize the reliability, scalability and cost-effectiveness of the mainframe. CA Top Secret provides an Advanced Authentication Mainframe feature, system entry validation, resource control, auditability, accountability, administrative control, and SAF compatibility. In conjunction with distributed security solutions from CA Technologies, CA Top Secret provides mobile-to-mainframe enterprise class security and compliance management.

Top Secret Features

Top secret provides the following features:

  • Access Control: Top Secret provides fine-grained control over user access to mainframe resources, allowing administrators to specify precisely which users can access specific datasets, programs, or system functions.

  • Auditing and Logging: The solution generates comprehensive audit trails, capturing security-related events and activities, enabling organizations to monitor and analyze user actions for compliance purposes and security incident investigations.

  • Secure Remote Administration: Administrators can also securely manage and administer Top Secret from remote locations, allowing for efficient administration without compromising security.

  • Encryption: Top Secret supports encryption of sensitive data, ensuring that information stored on the mainframe remains protected from unauthorized access or disclosure.

  • Role-Based Access Control (RBAC): By implementing RBAC, Top Secret simplifies access management by assigning privileges and permissions based on predefined roles or job functions, reducing administrative overhead.

  • Integration with External Authentication Systems: Top Secret integrates with external systems, such as LDAP or Active Directory, enabling centralized user authentication and leveraging existing identity management infrastructure.

  • Secure Communication Channels: TS ensures secure communication channels between the mainframe and external systems, protecting data transmitted across networks from interception or tampering.

  • Compliance and Regulatory Support: Organizations can meet regulatory requirements and industry standards by providing security controls, auditing capabilities, and access management features.

  • Secure Key Management: Top Secret facilitates the secure management of encryption keys and digital signatures, ensuring the integrity and confidentiality of sensitive information.

  • Resource Protection: Mainframe resources are safeguarded from unauthorized access or modification, providing an additional layer of protection to critical assets and data.

  • Security Monitoring: The solution provides real-time monitoring of security events and alerts, enabling proactive threat detection and response to potential security incidents.

  • User Provisioning: Top Secret streamlines user provisioning processes, simplifying the onboarding and offboarding of users and ensuring that access is granted or revoked in a timely manner.

  • Session Management: The product offers session management capabilities, including session timeouts and session termination, ensuring that user sessions are properly managed and secure.

  • Top Secret Benefits

    Some of the benefits that Top Secret offers are:

    • Robust access control

    • Strong authentication mechanisms

    • Comprehensive auditing and logging

    • Protection of mainframe resources

    • Compliance with regulatory requirements

    • Secure remote administration

    • Encryption of sensitive data

    • Integration with external authentication systems

    • Secure communication channels

    • Support for encryption keys and digital signatures


Sample Customers
Tieto
First Tennessee Bank
Top Industries
REVIEWERS
Financial Services Firm57%
Healthcare Company10%
Energy/Utilities Company10%
Insurance Company10%
VISITORS READING REVIEWS
Financial Services Firm32%
Computer Software Company12%
Manufacturing Company11%
Logistics Company9%
REVIEWERS
Financial Services Firm100%
VISITORS READING REVIEWS
Financial Services Firm33%
Insurance Company13%
Computer Software Company8%
Government7%
Company Size
REVIEWERS
Small Business4%
Large Enterprise96%
VISITORS READING REVIEWS
Small Business6%
Midsize Enterprise5%
Large Enterprise89%
REVIEWERS
Small Business11%
Large Enterprise89%
VISITORS READING REVIEWS
Small Business17%
Midsize Enterprise5%
Large Enterprise78%
Buyer's Guide
Event Monitoring
March 2024
Find out what your peers are saying about BMC, ServiceNow, Microsoft and others in Event Monitoring. Updated: March 2024.
768,740 professionals have used our research since 2012.

OPS/MVS Automation Intelligence is ranked 14th in Event Monitoring while Top Secret is ranked 3rd in Mainframe Security. OPS/MVS Automation Intelligence is rated 9.4, while Top Secret is rated 8.6. The top reviewer of OPS/MVS Automation Intelligence writes "The ability to use command rules is great when our operators have repetitive tasks, but we'd like to automate off of different highlighted messages without actually knowing what the message is". On the other hand, the top reviewer of Top Secret writes "In terms of authorization, it controls what access accounts have with the two resources on the mainframe". OPS/MVS Automation Intelligence is most compared with BMC MainView, IBM Tivoli OMEGAMON, BMC TrueSight Operations Management and SCOM, whereas Top Secret is most compared with IBM Resource Access Control Facility, ACF2, IBM Security zSecure and CA TPX Session Manager.

We monitor all Event Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.