IBM Resource Access Control Facility Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
Real User
Mainframe Security Specialist, RACF and zSecure Technician, CA-TSS Specialist, Security Team Leader
Mar 08 2017

What is most valuable?

* Perfectly integrated with the z/OS operating system and all the other products in the IBM z/OS family. * Product updates are automatic and are released by IBM in conjunction with the z/OS upgrades. * The organizational process of the access... more»

How has it helped my organization?

It's very difficult for me to describe a concrete example. However, since we have been using RACF, our access permissions structure is much better organized and explained. We now have a one-to-one correspondence between a resource and access... more»

What needs improvement?

I would like the generation of RACF on-screen listings and reports to be more flexible. We security administrators often have to act quickly. Certain information should be available as quickly as possible.
Real User
Senior systems engineer at Unum
Mar 31 2017

What do you think of IBM Resource Access Control Facility?

Valuable Features It's completely secure. That's the best answer I can give you. We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups. Our resources are secured with this product. • Room for Improvement I would welcome something that is more easily integrated with distributor platforms. • Stability Issues The stability is excellent. • Scalability Issues It's only a mainframe product so it doesn't cross platforms. It does integrate with some of our distributed solutions which is good. Some of that we haven't fully implemented. • Customer Service and Technical Support I haven't personally used the technical support. • Previous Solutions We have other...
Find out what your peers are saying about IBM, CA Technologies, Xbridge and others in Mainframe Security.
288,321 professionals have used our research since 2012.
Real User
IT Security Analyst Senior at a tech services company with 1,001-5,000 employees
Mar 09 2017

What do you think of IBM Resource Access Control Facility?

Valuable Features The granularity and ease of setting up role-based access. • Improvements to My Organization Through the use of ISPF tables, we were able to configure panels to aid with provisioning and administration functions. • Room for Improvement The way to pull security logs could be better. Currently, violations are written to SMF records. You need to run jobs to pull this info unless you are running tools to do this for you. • Use of Solution I have used it personally for five years. I have used it with the company for over 30 years. • Stability Issues We have not had any stability problems. • Scalability Issues We have not had any scalability problems. • Customer Service and Technical Support Technical support is exceptional. • Previous...

Articles

User Assessments By Topic About IBM Resource Access Control Facility

Find out what your peers are saying about IBM, CA Technologies, Xbridge and others in Mainframe Security.
288,321 professionals have used our research since 2012.

IBM Resource Access Control Facility Questions

IBM Resource Access Control Facility Projects By Members

IBM Resource Access Control Facility Consultants

What is IBM Resource Access Control Facility?

In 1976, IBM set the standard for security products when RACF was introduced!

From the beginning, the RACF Development Team has proudly brought you RACF, the premier product for securing your most valuable corporate data. Working closely with your operating system's existing features, IBM's award-winning Resource Access Control Facility (RACF) licensed program provides improved security for an installation's data. RACF protects your vital system resources and controls what users can do on the operating system.

You decide which resources you want to protect and which users need access to them. RACF provides the functions that let you:

  • identify and verify system users
  • identify, classify, and protect system resources
  • authorize the users who need access to the resources you've protected
  • control the means of access to these resources
  • log and report unauthorized attempts at gaining access to the system and to the protected resources
  • administer security to meet your installation's security goals
Also known as
IBM RACF
BUYER'S GUIDE
Not sure which Mainframe Security solution is right for you?

Download our free Mainframe Security Report and find out what your peers are saying about IBM, CA Technologies, Xbridge, and more!

Sign Up with Email