Logo
Sign in
Product Logo
IBM zSecure Manager for RACF z/VMIBM

IBM zSecure Manager for RACF z/VM simplifies the complex network security management inherent in a virtual machine environment: automating auditing, minimizing threats, and verifying IT compliance.

Vendor

Vendor

IBM

Company Website

Company Website

Product details

Add VM network security management horsepower now

IBM z/VM is a highly secure and scalable virtualization technology for cloud infrastructure and for running critical applications. It supports Linux, z/OS, z/VSE, and z/TPF operating systems on IBM Z and LinuxONE servers and can host thousands of virtual servers on a single system. zSecure Manager for RACF z/VM simplifies the complex security administration and IT compliance issues inherent in a virtual machine environment.

With zSecure Manager for RACF z/VM you can execute queries in seconds and implement mass changes with little administrative overhead. You can identify RACF problems on the z/VM operating system, such as missing or inconsistent definitions, enabling you to fix or prevent mistakes before they become a threat to security and compliance. You can copy or move users, groups, resources, applications, or whole databases, and rename IDs within the same database. Produce reports in email format daily, on a custom schedule. Plus, IBM zSecure Manager for RACF z/VM offers an extended framework to support automation and compliance verification.

Features

  • **Simplify security administration through automation: **Execute queries in seconds and implement mass changes with less administrative overhead.
  • **Analyze RACF profiles to get fast answers: **Read and update the RACF database directly from an OS-formatted disk or a copied or unloaded RACF database. Answer questions such as: “Who has access to this file?” and “Which system special users have not changed their passwords?” Analyze System Management Facility (SMF) information from the live SMF data or from archived SMF data. View information using live data interactively almost immediately after an event has occurred.
  • **Lower breach risks with automated analysis and reporting: **Identify RACF problems on the z/VM operating system, such as missing or inconsistent definitions, enabling you to fix or prevent mistakes before they become a threat to security and compliance. Monitor privileged users to help ensure that old accounts are properly deleted and that products have been well integrated, helping to avoid vulnerabilities that can be exploited by other users.
  • **Customize reports to meet your specific needs: **A short list of report capabilities include: generating reports in XML format, importing report data into databases and reporting tools, viewing data with Microsoft Internet Explorer or Microsoft Excel, allowing managers to view, sort and annotate audit reports and producing reports centrally for automatic distribution to decentralized groups.
  • **Merge security rules from different databases: **Copy or move users, groups, resources, applications, or whole databases, and rename IDs within the same database. Produce reports in email format daily, on a custom schedule, only when specific events occur, or when there is a security breach. Modify displays and reports using CARLa Auditing and Reporting Language (CARLa).
  • **Support external files of existing data: **Filter external supplementary information from existing data sources and corporate applications (such as unit, department, and personnel data) and present it alongside the technical data from z/VM and IBM RACF in automatically generated reports.

Benefits

  • **Automate routine tasks: **Simplify complex security administration tasks using one-step actions that can be performed without extensive RACF knowledge.
  • **Minimize threats to your mainframe: **View vital z/VM information and swiftly identify and fix problems that might require further investigation. Rank issues by audit priority with a number indicating the relative impact of a problem.
  • **Have a single source of truth: **Merge security rules from different databases: copy or move users, groups, resources, applications, or whole databases. Rename IDs within the same database.
  • **Verify security effectiveness: **Perform—when merging—extensive consistency checks and report potential conflicts before generating commands. Create a comprehensive audit trail without substantial manual effort.