Chat with us, powered by LiveChat

EKC Mainframe Products

Call or Email now for more information!
Telephone: 702.794.0014 ext: 320

E-SCC – EKC Security Classification and Categorization

  • Exports RACF security data as groups, connects and permits based on the natural roles defined in the security data.
  • Exports ACF2 security data as ACF2 r14 ROLESETs using the natural roles identified in the security data.
  • Exports ACF2 security data as ETF/A RBAC rule sets utilizing the new RBAC rule sets and role UID strings.

A PC based graphical (“GUI”) software product that provides enhanced data analysis and reporting for the EKC Security Reporting Facility (E-SRF) for IBM RACF and CA-ACF2. E-SCC takes input from EKC’s E-SRF security access analysis and provides a graphical method to view the data. It also displays logical roles determined from the security data and shows the users in each role and the relationship of roles to superior and subordinate roles. It graphically displays the overall security environment of the security database.

E-SRF – Your Tool for Sarbanes-Oxley Reports

A comprehensive security analysis and reporting tool designed to provide critical security information. This product addresses the reporting needs of Security Administrators, Auditors, and the people who are responsible for both the resources being protected and the users who are accessing these resources.

  • Features two powerful capabilities: Event Reporting (what happened) and Access Analysis (what could happen).

ETF/R – Firecall Access & System Tools for IBM RACF

The only integrated facility which provides predefined emergency firecall access on demand to resources managed by IBM’s RACF security system. Administrators can control the amount of access users may acquire and ensure SMF logging of all accesses granted as a result of Firecall. This feature satisfies audit requirements related to Sarbanes-Oxley and HIPAA compliance.

ETF/A – Emergency Firecall Access & Security Tools Facility for CA-ACF2

Enhances productivity and speeds ACF2 administration, rule change management, security file maintenance and recovery as extensions to ACF2. Among ETF/A’s many powerful features is our Emergency Access “Firecall” which addresses the issue of “How do I control access under emergency situations and still retain oversight and control?”.

EKC Product Facilities

Extra functionality enhancing the EKC Product experience – at no extra cost.

E-HelpDesk – Automated Password Reset and Synchronization Tool

Provides synchronization across all mainframe security systems to keep user’s password in synch. Automates the basic processes of password resetting that normally require a call to a Security Support or Help Desk facility.

ESSF/R – EKC Security Services Facility for IBM RACF

  • RACF Profile Archival & Real-Time Recovery
  • Profile Cloning
  • Profile Maintenance & Repair Facility

This product has powerful features to assist you when using IBM’s RACF. Automatic profile archival and real-time recovery, user cloning, and profile maintenance, make ESSF the product to use in the RACF environment. In addition, by linking multiple user ids for a single user together, password changes become less painful for your users – changing one changes them all!

E-PAL – Special Access Assignment

Allows fast and easy assignment of dataset or resource access without impacting current user access, security implementation, or established security policy. E-PAL is designed to control additional access for special projects, or temporary access for consultants, without any modifications to either CA-ACF2 rules, or IBM-RACF profiles. All access granted under E-PAL may be broader, or more restrictive, than what is otherwise permitted. SMF records are produced and a program is provided to report successful access, as well as access denied.

E-SME – Security Management Extensions Facility

Enterprise programming interface to provide remote administration of CA-ACF2 and IBM-RACF users through desktop applications. TCP/IP communications are encrypted and coded to ensure that only authorized applications may access the enterprise even over a non-secure connection.