CA Tape Encryption is designed to be an innovative, flexible, easily implemented and comprehensive z/OS® tape encryption solution.
It helps ensure that your data is protected from breaches—even if your tapes fall into the wrong hands.
CA Tape Encryption helps you safeguard your sensitive data and automate full lifecycle key management. And it can be implemented without the need to purchase expensive and complex hardware.
With this mainframe solution, you can take steps to shield your company from fines, costly corrective processes and the negative publicity that can occur when personal and business-critical data are compromised. CA Tape Encryption helps you implement your security strategy while containing costs by:
Encrypting any application data as it is written to z/OS tape
Automating the cryptography process
In 1976, IBM set the standard for security products when RACF was introduced!
From the beginning, the RACF Development Team has proudly brought you RACF, the premier product for securing your most valuable corporate data. Working closely with your operating system's existing features, IBM's award-winning Resource Access Control Facility (RACF) licensed program provides improved security for an installation's data. RACF protects your vital system resources and controls what users can do on the operating system.
You decide which resources you want to protect and which users need access to them. RACF provides the functions that let you:
CA Tape Encryption is ranked 13th in Mainframe Security while IBM Resource Access Control Facility is ranked 2nd in Mainframe Security. CA Tape Encryption is rated 0.0, while IBM Resource Access Control Facility is rated 0.0. On the other hand, CA Tape Encryption is most compared with , whereas IBM Resource Access Control Facility is most compared with CA ACF2, CA Top Secret, CA TPX Session Manager, CA VM:Secure and IBM Security zSecure.
See our list of best Mainframe Security vendors.
We monitor all Mainframe Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.