Vanguard Offline allows detailed reporting of how resources are accessed including, who, when, where, and what level of authority. This allows for complete and accurate remediation of excessive or inappropriate access to resources.
Do you have a method for simulation testing prior to implementation in a production environment?
How do you know what impact your changes will have on the company or users?
Do you have a method to report on how resources were accessed, including who, when, where, and what level of authority they have?
Differentiators
Offline captures the authentication requests, including the ones designated as bypass.
Automates tests and analyzes how new z/OS Security Server commands will impact users and processes before those commands are executed in a production environment.
Uses actual z/OS Security Server authorization and authentication requests as input to the verification engine; resulting in avoidance of operational disruption while making changes to the z/OS Security Server.
Security administrators can execute commands against a copy of their database as if against a production system and analyze the potential impact of the new commands and all consequences thereof.
Features
Impact Analysis Report (IAR).
Easy-to-use panel. User Interface is consistent with Vanguard Administrator.
Collects and aggregates all security decisions into a database.
Produces a wide-range of usage reports for auditors and security administrators.
Provides complete accounting of all authorization requests.
Provides a simple method for remediation of elevated access and authorities.
Offline Checks access previously granted via SURROGAT SUBMIT Profiles
Vanguard Offline will record all access that occurs via a SURROGAT ID. When requested Vanguard Offline can provide a report that shows the effect of removing access to a SURROGAT SUBMIT profile.