IBM Resource Access Control Facility Archived Reviews (More than two years old)

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Kathy Collins
Real User
Senior systems engineer at Unum
Mar 31 2017

What is most valuable?

It's completely secure. That's the best answer I can give you. We're able to do role-based security so when new people join the company we're able to quickly add them to the proper security through role-based security groups. Our resources… more »

What needs improvement?

I would welcome something that is more easily integrated with distributor platforms.

Which solution did I use previously and why did I switch?

We have other solutions in place, and we had CA Top Secret in place before we used RACF. The purchase was a decision outside of my hands.

What other advice do I have?

I would recommend it as a mainframe solution.

Which other solutions did I evaluate?

We looked for transportability in evaluated products but that was twenty-five years ago so I have no idea what was evaluated.
Consultant
IT Security Analyst Senior at a tech services company with 1,001-5,000 employees
Mar 09 2017

What is most valuable?

The granularity and ease of setting up role-based access.

How has it helped my organization?

Through the use of ISPF tables, we were able to configure panels to aid with provisioning and administration functions.

What needs improvement?

The way to pull security logs could be better. Currently, violations are written to SMF records. You need to run jobs to pull this info unless you are running tools to do… more »

What's my experience with pricing, setup cost, and licensing?

It can be costly, but necessary, for an IBM mainframe running z/OS.

Which solution did I use previously and why did I switch?

We had CA Top Secret. We switched for easier maintenance and better integration with IBM z/OS.

What other advice do I have?

If you are running ACF2 or Top Secret, the switch is well worth it. Do it.

Which other solutions did I evaluate?

We evaluated ACF2 and Top Secret.
Vendor
Mainframe Security Specialist, RACF and zSecure Technician, CA-TSS Specialist, Security Team Leader
Mar 08 2017

What is most valuable?

* Perfectly integrated with the z/OS operating system and all the other products in the IBM z/OS family. * Product updates are automatic and are released by IBM in conjunction with the z/OS upgrades. * The organizational process of the access rights management is very simple and reliable. * We can… more »

How has it helped my organization?

It's very difficult for me to describe a concrete example. However, since we have been using RACF, our access permissions structure is much better organized and explained. We now have a one-to-one correspondence between a resource and access rights of that resource.

What needs improvement?

I would like the generation of RACF on-screen listings and reports to be more flexible. We security administrators often have to act quickly. Certain information should be available as quickly as possible.

Which solution did I use previously and why did I switch?

Before May 2015, my company was using CA Top Secret, the most relevant competitor to IBM RACF in the mainframe security administration. CA Top Secret is also a good product, but my company has preferred IBM RACF for the valuable features.

What is IBM Resource Access Control Facility?

In 1976, IBM set the standard for security products when RACF was introduced!

From the beginning, the RACF Development Team has proudly brought you RACF, the premier product for securing your most valuable corporate data. Working closely with your operating system's existing features, IBM's award-winning Resource Access Control Facility (RACF) licensed program provides improved security for an installation's data. RACF protects your vital system resources and controls what users can do on the operating system.

You decide which resources you want to protect and which users need access to them. RACF provides the functions that let you:

  • identify and verify system users
  • identify, classify, and protect system resources
  • authorize the users who need access to the resources you've protected
  • control the means of access to these resources
  • log and report unauthorized attempts at gaining access to the system and to the protected resources
  • administer security to meet your installation's security goals
Also known as
IBM RACF