A PC based graphical (“GUI”) software product that provides enhanced data analysis and reporting for the EKC Security Reporting Facility (E-SRF) for IBM RACF and CA-ACF2. E-SCC takes input from EKC’s E-SRF security access analysis and provides a graphical method to view the data. It also displays logical roles determined from the security data and shows the users in each role and the relationship of roles to superior and subordinate roles. It graphically displays the overall security environment of the security database.
A comprehensive security analysis and reporting tool designed to provide critical security information. This product addresses the reporting needs of Security Administrators, Auditors, and the people who are responsible for both the resources being protected and the users who are accessing these resources.
The only integrated facility which provides predefined emergency firecall access on demand to resources managed by IBM’s RACF security system. Administrators can control the amount of access users may acquire and ensure SMF logging of all accesses granted as a result of Firecall. This feature satisfies audit requirements related to Sarbanes-Oxley and HIPAA compliance.
Enhances productivity and speeds ACF2 administration, rule change management, security file maintenance and recovery as extensions to ACF2. Among ETF/A’s many powerful features is our Emergency Access “Firecall” which addresses the issue of “How do I control access under emergency situations and still retain oversight and control?”.
Extra functionality enhancing the EKC Product experience – at no extra cost.
Provides synchronization across all mainframe security systems to keep user’s password in synch. Automates the basic processes of password resetting that normally require a call to a Security Support or Help Desk facility.
This product has powerful features to assist you when using IBM’s RACF. Automatic profile archival and real-time recovery, user cloning, and profile maintenance, make ESSF the product to use in the RACF environment. In addition, by linking multiple user ids for a single user together, password changes become less painful for your users – changing one changes them all!
Allows fast and easy assignment of dataset or resource access without impacting current user access, security implementation, or established security policy. E-PAL is designed to control additional access for special projects, or temporary access for consultants, without any modifications to either CA-ACF2 rules, or IBM-RACF profiles. All access granted under E-PAL may be broader, or more restrictive, than what is otherwise permitted. SMF records are produced and a program is provided to report successful access, as well as access denied.
Enterprise programming interface to provide remote administration of CA-ACF2 and IBM-RACF users through desktop applications. TCP/IP communications are encrypted and coded to ensure that only authorized applications may access the enterprise even over a non-secure connection.