Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Log360 Reviews & Ratings
    168 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,037 Ratings
    Company Website
  • Josys Reviews & Ratings
    245 Ratings
    Company Website
  • Rippling Reviews & Ratings
    19,366 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    638 Ratings
    Company Website
  • Securden Password Vault for Enterprises Reviews & Ratings
    55 Ratings
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,764 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    17 Ratings
    Company Website

What is IBM Security zSecure?

The IBM® zSecure Suite offers a robust framework for security assurance through various features such as auditing, alerting, administration, reporting, and authentication, which collectively enhance security and risk management for IBM Z® hardware, software, virtualization, and widely used external security managers (ESMs) like IBM RACF, CA ACF2, and CA Top Secret. By automating essential security administrative tasks, the zSecure Suite not only boosts operational efficiency but also reduces the likelihood of human error, adeptly recognizing both internal and external security threats while providing immediate alerts and ensuring adherence to relevant standards. This suite goes beyond mere task automation; it is crucial for effective identity governance, which is vital for compliance with regulatory frameworks. In addition, it actively identifies potential threats, offers real-time alerts, and monitors compliance with critical practices such as pervasive encryption to satisfy GDPR requirements. The suite also strengthens authentication mechanisms, thereby improving user access controls and simplifying management for security professionals. Overall, the IBM zSecure Suite serves as an all-encompassing solution that effectively responds to the ever-changing security challenges faced by organizations today. Furthermore, its comprehensive nature ensures that organizations can maintain a resilient security posture in an increasingly complex digital landscape.

What is Broadcom Compliance Event Manager?

Broadcom Compliance Event Manager is a comprehensive mainframe cybersecurity and compliance monitoring solution designed to help organizations maintain continuous visibility into the security of their mission-critical systems and data. The platform enables organizations to implement advanced security continuous monitoring across mainframe environments, addressing a major gap that often exists in enterprise cybersecurity strategies. Compliance Event Manager continuously monitors z/OS system settings, external security manager controls, applications, and software environments to identify suspicious activity, unauthorized changes, and potential security breaches in real time. The solution supports major security environments including ACF2, Top Secret, and IBM RACF, helping organizations strengthen oversight across complex mainframe infrastructures. Real-time alerts and automated event notifications allow SIEM platforms and SOC teams to respond more effectively to evolving security threats and compliance concerns. Compliance Event Manager also includes file monitoring and intrusion detection capabilities that help organizations track system file changes, monitor user activity, and detect vulnerabilities before they escalate into larger security incidents. The platform simplifies regulatory compliance by automating time-consuming monitoring and reporting processes while providing deeper insights into enterprise risk posture. Organizations can leverage detailed audit trails and archived activity records to support forensic investigations, compliance reporting, and incident analysis on both a real-time and historical basis. By filtering and forwarding only critical security events, the solution reduces operational costs and improves the efficiency of enterprise security operations.

Media

Media

Integrations Supported

IBM Z
RadiantOne

Integrations Supported

IBM Z
RadiantOne

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

IBM

Date Founded

1911

Company Location

United States

Company Website

www.ibm.com/security/mainframe-security/zsecure

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/mainframe/security/compliance-event-manager

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Popular Alternatives

Rocket z/Assure VAP Reviews & Ratings

Rocket z/Assure VAP

Rocket Software

Popular Alternatives

SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies
ACSIA Reviews & Ratings

ACSIA

DKSU4Securitas Ltd