Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Airlock Digital Reviews & Ratings
    35 Ratings
    Company Website
  • Pipefy Reviews & Ratings
    588 Ratings
    Company Website
  • Google Chrome Enterprise Reviews & Ratings
    2,062 Ratings
    Company Website
  • Cerberus FTP Server Reviews & Ratings
    159 Ratings
    Company Website
  • Securden Endpoint Privilege Manager Reviews & Ratings
    7 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,707 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    122 Ratings
    Company Website
  • Securden Password Vault for Enterprises Reviews & Ratings
    55 Ratings
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website

What is V:M Secure for z/VM?

A comprehensive security and directory management solution specifically designed for z/VM is essential for minimizing risks by enforcing strict security measures and managing resource access within both z/VM and Linux on System z environments. V:M Secure for z/VM plays a key role in reducing the likelihood of accidental security breaches by ensuring that the user directory within z/VM remains aligned with your established security standards. This system streamlines the automatic implementation of extensive IT security policies, assists in the detection of security violations, and produces thorough reports and audit trails. It grants overarching control over access to all system resources while facilitating the delegation of disk space management and the automated movement of direct access storage devices (DASD). By applying rigorous protections, the security threats related to the z/VM ecosystem are considerably lowered. Additionally, it provides flexible access to resources for both z/VM and Linux on System z systems, while simplifying management across various IT vulnerabilities, from user access to data and system audits, thus improving overall security and operational effectiveness. Implementing such a solution not only enhances security but is also instrumental in ensuring adherence to regulatory compliance. Moreover, it empowers organizations to maintain a proactive stance against emerging threats, fostering a more resilient IT infrastructure.

What is CA Auditor for z/OS?

With the advancement of each computer generation, operating systems are becoming increasingly intricate. This heightened complexity has made the auditing process for these systems more challenging and time-intensive. Security vulnerabilities can arise in all types of operating systems, including mainframes, due to improper installations, custom configurations, and ongoing maintenance bugs. CA Auditor emerges as a powerful software solution that automates the technical evaluation of both hardware and software environments, effectively identifying areas at risk for integrity issues. It is adept at uncovering potential security flaws that may result from misconfigured setups, allowing users to conduct a comprehensive assessment of the operating system and its various components. Furthermore, CA Auditor includes features that monitor system usage and safeguard critical system files' integrity. By leveraging CA Auditor, users can effectively tackle major vulnerabilities within the z/OS operating system, which facilitates precise auditing, integrity assessments, and essential verifications aimed at strengthening security protocols. This holistic strategy not only reduces risks but also contributes to cultivating a more secure computing landscape while ensuring compliance with established security standards.

Media

Media

Integrations Supported

Delinea Cloud Access Controller
IBM z/VM
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

Integrations Supported

Delinea Cloud Access Controller
IBM z/VM
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/mainframe/product-portfolio/vm-secure-zvm

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/mainframe/compliance-data-protection/auditor

Categories and Features

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives

CA Cleanup Reviews & Ratings

CA Cleanup

Broadcom
CA Cleanup Reviews & Ratings

CA Cleanup

Broadcom
SDS IronSphere Reviews & Ratings

SDS IronSphere

Software Diversified Services