
SECURITRETreehouse Software
Security interface for Adabas/Natural environments, centralizing access control via enterprise security systems like RACF, ACF2, or Top Secret.
Vendor
Treehouse Software
Company Website
STRFS.pdf
STRPO.pdf
Product details
SECURITRE is a software interface that integrates Adabas and Natural environments with enterprise security systems such as RACF, ACF2, or Top Secret. It centralizes all security rules in a single rule base, streamlining administration, auditing, and access control for mainframe data and applications.
Key Features
Centralized Security Rule Base
- Stores all security rules in the enterprise security system’s single rule base.
- Eliminates redundant administration across multiple rule bases.
Comprehensive Access Controls
- Controls access at Adabas (database, file, field) and Natural (session, library, program, DDM) levels.
- Manages access for Adabas utilities and internal application security checks.
User-ID Based Access
- Access is controlled by User-ID, not passwords.
- Enhances accountability and control.
Flexible Security Levels
- Security can be tailored per resource, from strict to minimal or none.
- Adjusts easily as organizational needs change.
Program Pathing Sensitivity
- Restricts data access by User-ID, program, library, terminal, or job.
- Enables fine-grained access control.
Efficient Security Checking
- Core code is optimized in Assembler for low overhead.
- Intelligent table mechanisms reduce redundant checks.
Real-time Monitor
- Allows authorized personnel to view and modify security settings online.
- Facilitates rapid response to changing security requirements.
Integration with Other Treehouse Products
- Extends centralized security to related Treehouse products (e.g., TRIM, N2O).
- Controls program migrations and performance monitoring.
Benefits
Simplified Security Administration
- Single rule base reduces complexity and administrative effort.
- Streamlined auditing and reporting.
Enhanced Accountability
- User-ID based access ensures clear accountability for actions.
- Improved control over sensitive resources.
Operational Efficiency
- Minimal performance impact due to optimized code.
- Real-time adjustments reduce downtime for security changes.