Vanguard Offline allows detailed reporting of how resources are accessed including, who, when, where, and what level of authority. This allows for complete and accurate remediation of excessive or inappropriate access to resources.
Do you have a method for simulation testing prior to implementation in a production environment?
How do you know what impact your changes will have on the company or users?
Do you have a method to report on how resources were accessed, including who, when, where, and what level of authority they have?
ACF2 and Top Secret compatibility coming soon.
Offline captures the authentication requests including the ones designated as bypass, Vanguard has the ability to show those liabilities.
Automates tests and analyzes how new z/OS Security Server commands will impact users and processes before those commands are executed in a production environment.
Uses actual z/OS Security Server authorization and authentication requests as input to the verification engine resulting in avoidance of operational disruption while making changes to the z/OS Security Server.
Security administrators can execute commands against a copy of their database as if against a production system and analyze the potential impact of the new commands and all consequences thereof.
Collects and aggregates all security decisions into a database.
Produces a wide-range of usage reports for auditors and security administrators.
Provides complete accounting of all authorization requests.
Provides a simple method for remediation of elevated access and authorities.