Chat with us, powered by LiveChat

VANGUARD Active Alerts with SIEM

for z/OS, RACF, ACF2, and TSS

Vanguard Active Alerts sends user-specified event driven data to SIEMs, SNMP or SYSLOGD in industry standard formats as requested by the user.

VAC sends event driven data to identified target devices, which receives the “real time” information in a timely manner for Compliance, Security and Audit requirements.


  • Delivers mainframe data to all conventional SIEM products
  • Connects with standard z/OS security products
  • Monitors z/OS and UNIX System Services (USS)
  • Gathers intelligence from z/OS SMF and the system operator interface
  • Uses both signature and anomaly-based attack detection
  • Provides real-time alerts that can be managed, filtered, routed, and searched via SIEM software
  • APIs allow for defining and filtering TSO, CICS, and batch events
  • Easy installation does not require z/OS IPLs
  • A small footprint in each LPAR, with little CPU overhead

Mainframes already share a lot of information about what’s happening (event log, audit log, syslog, etc.), You need to achieve a way to quickly and easily separate critical security incidents from business-as-usual events and send them in the right format to your enterprise SIEM.


Vanguard Active Alerts with SIEM forwards these mainframe log messages in the proper format, as well as those from RACF, ACF2, Top Secret, DB2, CICS, FTP, and z/Linux to Security Information and Event Management (SIEM) systems such as ArcSight, IBM® QRadar®, Splunk®, and others. Mainframe teams must comply with strict audit policies but may not have the time or the resources to filter and format the right data and send it to the enterprise SIEM. Vanguard Alert Connector can help.

Call or Email now for more information.
• 702.794.0014