Overview. Business value

Similar documents
CA Dynam /T Tape Management for z/vse

CA RC/Secure for DB2 for z/os

CA ERwin Data Profiler

Version Overview. Business value

agility made possible

CA Rapid Reorg for DB2 for z/os

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

CA Teleview Session Management for z/os r4.4

5 OAuth Essentials for API Access Control

Accelerate Your Enterprise Private Cloud Initiative

Comune della Spezia protects service continuity with integrated backup and replication from CA Technologies

BRM Accelerator Release Notes - On Premise. Service Pack

Dynamic What? I m Dynamic, Aren t You? Andrew Chapman & Sam Knutson VP Product Management CA Technologies

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

CA Cloud Service Delivery Platform

CA IT Client Manager / CA Unicenter Desktop and Server Management

WHITE PAPER MARCH Automating Data Masking and Reduction for SAP System Copy

RELEASING LATENT VALUE DOCUMENT: CA NETMASTER NETWORK MANAGEMENT R11.5. Releasing the Latent Value of CA NetMaster Network Management r11.

SOLUTION BRIEF CA Database Management for DB2 for z/os. How Can I Establish a Solid Foundation for Successful DB2 Database Management?

Oracle Buys Automated Applications Controls Leader LogicalApps

CA IDMS Server. Release Notes. r17

Closing the Biggest Security Hole in Web Application Delivery

Open Data Policy City of Irving

CA Automation Capabilities A Technical Look at Process and Runbook Automation. Tom Kouhsari and AJ Dennis

CA IDMS 18.0 & 18.5 for z/os and ziip

CA GovernanceMinder. CA IdentityMinder Integration Guide

Installing ISV Mainframe Products through a Web Browser with CA MSM: Update and User Experiences

CA SSO. Agent for Oracle PeopleSoft Release Notes. r12.51

IBM WebSphere Message Broker for z/os V6.1 delivers the enterprise service bus built for connectivity and transformation

# All Security All The Time: System z Security Update for CA ACF2, IBM RACF, CA Top Secret

CA SiteMinder. Advanced Password Services Release Notes 12.52

CA Nimsoft Monitor. Probe Guide for iseries Job Monitoring. jobs v1.3 series

CA ERwin Data Modeler r7.3

STRATEGIC PLAN

Run the business. Not the risks.

CA File Master Plus for IMS

CA PMA Chargeback. Release Notes. Release

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

New Zealand Government IBM Infrastructure as a Service

On Premise. Service Pack

On Premise. Service Pack

CA Database Management Solutions for IMS for z/os. Product Information Bulletin

Data Management and Security in the GDPR Era

CA Security Management

Release Notes. Release 12.2

TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

INTELLIGENCE DRIVEN GRC FOR SECURITY

Keep the Door Open for Users and Closed to Hackers

CA VM:Secure for z/vm

CA Mobile Device Management Configure Access Control for Using Exchange PowerShell cmdlets

CA Nimsoft Monitor. Probe Guide for DHCP Server Response Monitoring. dhcp_response v3.2 series

Legal notice and Privacy policy

Protect Your Data the Way Banks Protect Your Money

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

IBM Software IBM InfoSphere Information Server for Data Quality

Data Governance: Data Usage Labeling and Enforcement in Adobe Cloud Platform

What is ISO ISMS? Business Beam

Security and Privacy Governance Program Guidelines

CA Cloud Service Delivery Platform

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

8) Subroutines and functions

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

CA Cloud Service Delivery Platform

Grow Your Services Business

MyCreditChain Terms of Use

Differentiate Your Business with Oracle PartnerNetwork. Specialized. Recognized by Oracle. Preferred by Customers.

Abstract. Introduction

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

Build a viable plan for disaster recovery and crisis management.

How to Deploy and Use the CA ARCserve RHA Probe for Nimsoft

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

Smart Data Center Solutions

CA EPIC for z/vse. Release Notes. r5.2

CA Cloud Service Delivery Platform

PPM Essentials Accelerator Product Guide - On Premise. Service Pack

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

CA Desktop Migration Manager

New Zealand Government IbM Infrastructure as a service

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

CA IdentityMinder. Glossary

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber

HIPAA Regulatory Compliance

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0 Maintenance Release: 1. Release Notes

Release Notes. BlackBerry Enterprise Identity

VMware Cloud Operations Management Technology Consulting Services

IT Consulting and Implementation Services

Information Security Policy

Modern Database Architectures Demand Modern Data Security Measures

Differentiate Your Business with Oracle PartnerNetwork. Specialized. Recognized by Oracle. Preferred by Customers.

Perfect Balance of Public and Private Cloud

University of Hawaii REQUEST FOR INFORMATION Strategic Communication Service Platform

CA TPX Session Management

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):

Transcription:

PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to fully realize the reliability, scalability and costeffectiveness of the mainframe. Overview The z/vse operating system lacks adequate tools for securing system resources. Many organizations are required to comply with government regulations, including HIPAA, SOX and GLBA, as well as existing corporate policies and industry agreements. With the introduction of new technologies for the mainframe, new security concerns are rapidly developing. To stay ahead of today s challenges; organizations must strengthen security, streamline administration and provide enhanced auditing capabilities. Business value CA Top Secret for z/vse delivers access control software for z/vse operating systems. CA Top Secret for z/vse provides the flexibility and control that you need to monitor and adjust your security policies and it accommodates virtually all organizational structures. It offers administrative tools, extensive reporting options, online monitoring and automatic logging capabilities that secure your environment while enabling comprehensive auditing and controlled sharing of data and resources.

Features Security you can trust Information security is critical to achieving business efficiency and growth, superior customer service and information privacy. Today, organizations view technology as a strategic resource and seek to gain competitive advantage by providing easier, faster and more reliable access to products and services. A secure, reliable and cost-effective security infrastructure is essential for the execution of today s business strategies. Many organizations are rightly concerned about the security issues that arise when establishing web links to valuable mainframe databases. CA Top Secret for z/vse addresses these concerns by enabling IT organizations to exploit the latest hardware, networking and operating system components offered for the mainframe. CA Top Secret for z/vse protects your mainframe computer systems and data by controlling access to resources. It delivers flexible, streamlined administration, helping you quickly and efficiently manage users and control resources. In addition, it enables rapid, cost-effective response to changing business needs. CA Top Secret for z/vse is delivered complete with flexible and powerful administrative tools, automatic logging facilities, and extensive reporting and online monitoring capabilities. Authorized individuals are provided a wide range of opportunities to analyze and evaluate computer access activities and trends. Administrators can quickly and easily set and adjust security policies to respond to rapidly changing business needs. Key capabilities Comprehensive security: CA Top Secret for z/vse provides comprehensive security for z/vse resources across operating systems, subsystems, OEM software and databases. Operating system release support: CA Top Secret for z/vse supports new operating system releases as they become generally available. Exploitation of new releases: CA Top Secret for z/vse takes advantage of new features and functions to provide enhanced security administration and management functionality. Inclusive user management: Individual accountability is the key to effective information security. Many government regulations and corporate policies require separation of functions or duties. CA Top Secret for z/vse lets you decide what policies are relevant and implement those structures. Users: CA Top Secret for z/vse provides easy-to-use administration functions that adapt to your organization s structure and procedures to support compliance with regulations and laws. Role-based security: The profile ACID is how CA Top Secret for z/vse implements rolebased security and is flexible in order to adapt to your organization s changes. 2

Individual accountability: Users are protected by a password. Consistent password policies are enforced throughout your organization, strengthening the effectiveness of passwords and increasing information security. Data and resource management: Your data center managers are responsible for helping to ensure the integrity of all data and programs stored on their computer systems. Any data loss can potentially translate into financial loss. Protection by default: CA Top Secret for z/vse safeguards against loss or abuse by protecting all data by default. When CA Top Secret for z/vse is implemented correctly, no action is required to secure your data. Controlled sharing of data: CA Top Secret for z/vse requires that you grant permission to allow access to resources. This process enables you to know and control who has access to what. Auditing and monitoring: Several laws in many countries require organizations to establish internal controls pertaining to computerized data. CA Top Secret for z/vse includes a variety of audit functions that provide the information and capabilities you need to monitor access and assess the propriety of access rights. Auditing: CA Top Secret for z/vse generates audit records for virtually any security related event, including start and stops of the security system, any command to modify the running security system, successful or unsuccessful user system entry or exit, failed or audited data set access, failed or audited resource access and changes to the security databases. In addition, CA Top Secret for z/vse provides the WHOHAS command to facilitate the requirement to quickly review access to data or resources. Reports: CA Top Secret for z/vse provides a complete set of report generators that let you view and analyze your security event information. In addition, it allows you to limit the output of a particular report according to the privileges and restrictions of the specific user who is executing the report. Separation of administrative functions: While the implementation of security is very important, so is the responsibility for security administration. Restricting who can grant access and define your users is a cornerstone for effective security. CA Top Secret for z/vse provides separation of security administration functions and duties, an additional management control that safeguards your systems and preserves the integrity of your security records. Decentralized or centralized administration: CA Top Secret for z/vse delivers several ways for you to separate security administration functions. First, it provides you with different levels of administrative authority (privileges) over your users and/or resources. In addition, it can scope or limit privileges to discrete security functions, areas or resources. 3

Changes to security: Standard reports display updates, additions, changes or deletions of any CA Top Secret for z/vse user or rule, or other security records. Administration diversity: Without proper administration, there can be no guarantee that your security is structured correctly. To help meet your business requirements and ease the administration process, CA Top Secret for z/vse includes flexible and powerful administration tools. Command processing: CA Top Secret for z/vse allows you to administer security through batch or CICS. Multiple image security administration: In an environment with multiple system images, you can send CA Top Secret for z/vse commands from one node to single or multiple nodes. This is accomplished via the CA Top Secret Command Propagation Facility (CPF). Cross-platform administration: Command propagation can be achieved through CA Identity and Access Management, CA LDAP server, LDAP Directory Server, CA Distributed Security Integration, IBM Policy Director and CA Web Administrator for Top Secret. Delivery approach CA Services provides a portfolio of mainframe services delivered through CA Technologies internal staff and a network of established partners chosen to help you achieve a successful deployment and get the desired business results as quickly as possible. Our standard service offerings are designed to speed deployment and accelerate the learning curve for your staff. CA Technologies field-proven best practices and training help you lower risk, improve use/adoption and ultimately align the product configuration to your business requirements. Benefits Strengthen security and streamline administration CA Top Secret for z/vse protects your mainframe computer systems and data by controlling access to resources. It closely maps security to how you manage your organization using a flexible configuration mechanism unique to CA Technologies that automatically associates users to one or more roles. CA Top Secret for z/vse delivers flexible, streamlined administration, helping you to quickly and efficiently manage users and control resources. In addition, it enables rapid, cost-effective response to changing business needs. 4

CA Top Secret for z/vse enables you to strengthen security, simplify administration and provides enhanced auditing capabilities so that you: efficiently manage user identities and access to assets, proactively monitor accesses and reports, enforce business policies, comply with regulations and achieve end-to-end security management. When combined with other solutions from CA Technologies, CA Top Secret for z/vse provides end-to-end controls to help you meet your business and compliance requirements. The CA Technologies advantage CA Top Secret for z/vse delivers access control software for z/vse operating systems. It is part of an extensive solution set from CA Technologies that provides security, automation, performance management, scheduling, storage management, database technology, application development and reporting for the z/vse platform. These solutions help you manage, protect and optimize your z/vse systems with maximum efficiency. z/vse is built on a proud heritage of ongoing refinement and innovation that spans four decades. CA Technologies is committed to protecting and extending your z/vse investment by continuing to develop and enhance our z/vse solutions. CA Technologies has 30 years of recognized expertise in robust, reliable, scalable, and secure enterprise-class management software for multiple IT environments from mainframe and distributed, to virtual and cloud. The majority of the Global Fortune 500 rely on CA Technologies to manage their evolving IT ecosystems. For additional information, visit CA Technologies at ca.com. Copyright 2011 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA does not provide legal advice. Neither this document nor any CA software product referenced herein shall serve as a substitute for your compliance with any laws (including but not limited to any act, statute, regulation, rule, directive, policy, standard, guideline, measure, requirement, administrative order, executive order, etc. (collectively, Laws )) referenced in this document. You should consult with competent legal counsel regarding any 5 Laws referenced herein. CS1444_0711