Logo
Sign in

Security interface for Adabas/Natural environments, centralizing access control via enterprise security systems like RACF, ACF2, or Top Secret.

Vendor

Vendor

Treehouse Software

Company Website

Company Website

STRFS.pdf
STRPO.pdf
Product details

SECURITRE is a software interface that integrates Adabas and Natural environments with enterprise security systems such as RACF, ACF2, or Top Secret. It centralizes all security rules in a single rule base, streamlining administration, auditing, and access control for mainframe data and applications.

Key Features

Centralized Security Rule Base

  • Stores all security rules in the enterprise security system’s single rule base.
  • Eliminates redundant administration across multiple rule bases.

Comprehensive Access Controls

  • Controls access at Adabas (database, file, field) and Natural (session, library, program, DDM) levels.
  • Manages access for Adabas utilities and internal application security checks.

User-ID Based Access

  • Access is controlled by User-ID, not passwords.
  • Enhances accountability and control.

Flexible Security Levels

  • Security can be tailored per resource, from strict to minimal or none.
  • Adjusts easily as organizational needs change.

Program Pathing Sensitivity

  • Restricts data access by User-ID, program, library, terminal, or job.
  • Enables fine-grained access control.

Efficient Security Checking

  • Core code is optimized in Assembler for low overhead.
  • Intelligent table mechanisms reduce redundant checks.

Real-time Monitor

  • Allows authorized personnel to view and modify security settings online.
  • Facilitates rapid response to changing security requirements.

Integration with Other Treehouse Products

  • Extends centralized security to related Treehouse products (e.g., TRIM, N2O).
  • Controls program migrations and performance monitoring.

Benefits

Simplified Security Administration

  • Single rule base reduces complexity and administrative effort.
  • Streamlined auditing and reporting.

Enhanced Accountability

  • User-ID based access ensures clear accountability for actions.
  • Improved control over sensitive resources.

Operational Efficiency

  • Minimal performance impact due to optimized code.
  • Real-time adjustments reduce downtime for security changes.
Find more products by segment
Large BusinessEnterpriseB2BView all
Find more products by category
Security SoftwareView all