BMC AMI Security

BMC AMI Security

BMC Software
SDS IronSphere

SDS IronSphere

Software Diversified Services
+
+

Related Products

  • ManageEngine EventLog Analyzer
    191 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine ADAudit Plus
    487 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • Astra Pentest
    225 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website

About

Suspicious and known malicious actions are automatically halted before your systems are compromised. Real-time visibility for security responders and your operations team to rapidly close the window of opportunity for attackers. Data is correlated across multiple systems and translated into common security terms for clarity and context. Out-of-the-box scorecards help improve adherence to HIPAA, PCI DSS, and GDPR. Automated security scans tailored by security experts uncover and halt threats before a compromise occurs. Reports crafted by experts help you address risks by informing you of threat events, suspicious activity and regulatory compliance risks. Policy scanning based on real-world penetration tests uncovers configuration vulnerabilities before they are exploited.

About

This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Threat detection solution for companies

Audience

Companies in search of a solution offering continuous mainframe security monitoring and auditing

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BMC Software
Founded: 1980
United States
www.bmc.com/it-solutions/bmc-ami-mainframe-security.html

Company Information

Software Diversified Services
Founded: 1982
United States
www.sdsusa.com/security-software/automatic-mainframe-stig-monitoring/

Alternatives

Alternatives

Rocket z/Assure VAP

Rocket z/Assure VAP

Rocket Software
CA Cleanup

CA Cleanup

Broadcom
Top Secret

Top Secret

Broadcom

Categories

Categories

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

IBM Z
IBM z/OS
IBM z/VM
OverSOC
Panaseer

Integrations

IBM Z
IBM z/OS
IBM z/VM
OverSOC
Panaseer
Claim BMC AMI Security and update features and information
Claim BMC AMI Security and update features and information
Claim SDS IronSphere and update features and information
Claim SDS IronSphere and update features and information