+
+

Related Products

  • ManageEngine ADAudit Plus
    460 Ratings
    Visit Website
  • MedTrainer
    239 Ratings
    Visit Website
  • Keeper Security
    1,695 Ratings
    Visit Website
  • Incredable
    9 Ratings
    Visit Website
  • SBS Quality Management Software
    7 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Thinfinity Workspace
    14 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • Iru
    1,380 Ratings
    Visit Website

About

Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources.

About

A comprehensive security and directory management system for z/VM. It’s designed to help you minimize risk by establishing rigid safeguards and controlling access to z/VM and Linux on System z guest resources. V:M Secure for z/VM helps prevent inadvertent security exposures by automatically maintaining synchronization between the z/VM user directory and your security rules. It helps make it easier to enforce IT-wide security practices automatically, identify security offenders, and produce complete security reports and audit listings. Control over access to all system resources. Delegation of disk space management and automated direct access storage device (DASD) relocation. Minimize security risk of z/VM environment by enforcing rigid safeguards. Provide flexible access to z/VM resources and Linux on System z guests. Simplify management across disparate IT exposure points ranging from user access to resource, data, and system audit assets.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for a solution to mitigate risk and deepen trust in the identity of users

Audience

Organizations interested in a tool to secure their access to their assets

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/identity-access/trusted-access-manager-for-z

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/product-portfolio/vm-secure-zvm

Alternatives

Alternatives

CA Cleanup

CA Cleanup

Broadcom
Tectia

Tectia

SSH Communications Security

Categories

Categories

Integrations

IBM z/VM
IBM Z

Integrations

IBM z/VM
IBM Z
Claim Trusted Access Manager for Z and update features and information
Claim Trusted Access Manager for Z and update features and information
Claim V:M Secure for z/VM and update features and information
Claim V:M Secure for z/VM and update features and information