Alternatives to IBM Resource Access Control Facility (RACF)

Compare IBM Resource Access Control Facility (RACF) alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IBM Resource Access Control Facility (RACF) in 2026. Compare features, ratings, user reviews, pricing, and more from IBM Resource Access Control Facility (RACF) competitors and alternatives in order to make an informed decision for your business.

  • 1
    IBM Crypto Analytics Tool (CAT)
    Crypto Analytics Tool (CAT) collects security-relevant information and helps build your cryptographic inventory. Through the graphical client, it is easy to analyze security information. Enterprise-wide overview of all z/OS cryptographic consuming LPARs from a single CAT monitor client. Offers a comprehensive data view of the cryptographic security of the system. Allows monitoring to ensure that keys and cryptographic functions are set up and protected, complying with best practices. Eases policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.
  • 2
    zSecure Admin
    zSecure Admin enables you to automate time-consuming IT security management tasks by quickly identifying, analyzing, and preventing problems in IBM RACF. You can also monitor privileged users to help ensure old accounts are properly deleted and products have been integrated appropriately. zSecure Admin integrates smoothly with zSecure Audit for end-to-end monitoring and remediation. zSecure Admin can administer multiple systems with a single application interface. You can compare profiles, efficiently merge security rules from different databases, or rename IDs within the same database. When merging profiles from different databases, zSecure Admin performs extensive consistency checks and reports potential conflicts before generating commands, helping ease the burden of consolidation efforts ad compliance automation.
  • 3
    Rocket Data Virtualization
    Rocket® Data Virtualization (RDV) provides real‑time, zero‑copy access to mainframe and distributed data through a unified SQL abstraction layer. It lets organizations query and combine heterogeneous sources without data movement or replication, supporting analytics, AI/ML, and cloud‑native workloads while maintaining system‑of‑record governance. RDV connects to Db2, VSAM, IMS, Adabas, Datacom, and relational or cloud stores via JDBC/ODBC. Optimizations such as predicate pushdown, parallel execution, and adaptive caching deliver low‑latency access with minimal production impact. Security includes encryption, row/column‑level controls, data masking, and SAF/RACF integration, with high‑availability options for continuity. By keeping data in place and offloading read‑heavy workloads, RDV reduces mainframe CPU usage and enables governed enterprise data access without ETL or replication.
  • 4
    IBM Security zSecure
    The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.
  • 5
    Vanguard Authenticator

    Vanguard Authenticator

    Vanguard Integrity Professionals

    Vanguard Administration is a powerful cybersecurity solution that automates processes, offers powerful reporting with real-time management, and provides control over policy administration. Vanguard Audit & Compliance Solutions for z/OS, RACF, ACF2, and Top Secret (TSS) are among the most advanced cybersecurity audit and compliance tools in the industry. For over 30 years Vanguard has been engineering the tools to meet the most current regulation requirements while maintaining a secure environment for z/OS enterprises. Implement the widest range of Multifactor Authentication solutions with the most efficient implementation available.
  • 6
    TPX Session Management for z/OS
    Support the unique organizational specifications and session manager requirements within an enterprise. TPX Session Management for z/OS solves the problem of repeatedly logging in and out of your various applications connected to a VTAM network by enabling you to securely access and navigate between all the applications from a single menu. Securely grants authenticated access to dynamically built application menus. Supports multiple departmentalized requirements through customization of different users. Delivers enhanced performance and usability through data compression, simplified administration, and a single point of control, enabling commands and responses to be passed between instances. Transform your company and build your career with Broadcom training, certifications, and resources. Your hub for creating seamless integrations that tap into the full capabilities of mainframe services.
  • 7
    IBM Z Multi-Factor Authentication
    Mainframe systems are the foundation of trusted digital experiences for most of the world’s largest companies and organizations. However, passwords protecting critical users, data, and applications are a relatively simple point of attack for hackers to exploit because the passwords rely on user education and compliance for both implementation and control. By using a variety of methods, such as social engineering and phishing, criminals have exploited employees, partners, and general users to hack into even the most secure platforms. IBM Z MFA raises the level of assurance of your mission-critical systems with expanded authentication capabilities and options for a comprehensive, user-centered strategy that helps mitigate the risk of compromised passwords and system hacks. Our designers are also IBM Z MFA users. Across every new version, we incorporate their growing knowledge and expertise in real-world mainframe security scenarios.
  • 8
    Trusted Access Manager for Z
    Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources.
  • 9
    ACF2

    ACF2

    Broadcom

    Reliable, scalable security and streamlined administration for your mainframe. The success of businesses today depends on a reliable, comprehensive, and efficient security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. And consumers only trust businesses that protect their personal information. ACF2 provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. ACF2 Supports multi-factor advanced authentication with ACF2 for z/OS and, with ACF2 for Db2 for z/OS, provides the ability to externalize security for IBM Db2 without the need for an exit. Out-of-the-box identity and access management, logging, and audit reporting. Provides complete cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness.
  • 10
    Top Secret

    Top Secret

    Broadcom

    The success of today’s business strategies depends on a reliable, comprehensive, and cost-effective security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. Consumers will only trust businesses that protect their personal information. Top Secret provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and efficiency. Get out-of-the-box identity and access management, logging, and audit reporting. Get comprehensive cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. Get a flexible configuration mechanism that monitors and adjusts your security policies and accommodates virtually all organizational structures.
  • 11
    CA Mainframe Security Insights Platform
    Security Insights Platform helps ensure a trusted environment for your customers and employees by easily identifying and reducing risk from threats. It can quickly interpret and assess the security posture of your Mainframe. And, for risky findings, it helps develop remediation steps –all on an ongoing and ad hoc basis. Security Insights offers a foundation that enables your Mainframe to connect with your network and hybrid cloud across your enterprise. It enables you to securely deliver vital support for digital transformation. And, CA Security Insights output integrates with additional in-house tools such as SOC and SIEMs to provide a single, enterprise-wide view of your security posture. Collect, aggregate, and analyze security data to help remediate mainframe security risk. Eliminate manual, resource intensive, and time consuming data collection. Automate the heavy lifting.
  • 12
    CA Cleanup

    CA Cleanup

    Broadcom

    Easily automate continuous and unattended security file cleanup. CA Cleanup is designed to help you comply with many regulations and laws requiring due diligence for information security, protection and privacy. Mainframe security databases accumulate obsolete user IDs and entitlement definitions which may be valid but not appropriate for an individual’s role. This creates uncertainty, risk and greater potential for security exposure. It also creates an unnecessary burden for administrators and the system. More so, increasing regulatory, statutory, audit and staffing pressures are bringing new concerns and mandates to address the problem of excessive security entitlements. This is why CA Cleanup is needed. Executes continuously, monitoring your security system activity to record the actual security definitions that the system is or is not using. Monitors security activity and can identify used and unused access for any user or application.
  • 13
    BMC Compuware Application Audit
    BMC Compuware Application Audit enables security and compliance teams to easily capture start-to-finish mainframe user behavior in real time, including all successful logins, session keyboard commands and menu selections, and specific data viewed without making any changes to mainframe applications. Application Audit enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Get deep insight into user behavior including data viewed, by whom, and which applications were used to access it. Deliver the granular intelligence and reporting needed to comply with regulations such as HIPAA, GDPR, the Australian NDB scheme, as well as company security policies. Separate the system administrator’s duties from the responsibilities of auditors with a web UI, so that no single person is in a position to engage in malicious activities without detection.
  • 14
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 15
    SDS IronSphere

    SDS IronSphere

    Software Diversified Services

    This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
  • 16
    V:M Secure for z/VM
    A comprehensive security and directory management system for z/VM. It’s designed to help you minimize risk by establishing rigid safeguards and controlling access to z/VM and Linux on System z guest resources. V:M Secure for z/VM helps prevent inadvertent security exposures by automatically maintaining synchronization between the z/VM user directory and your security rules. It helps make it easier to enforce IT-wide security practices automatically, identify security offenders, and produce complete security reports and audit listings. Control over access to all system resources. Delegation of disk space management and automated direct access storage device (DASD) relocation. Minimize security risk of z/VM environment by enforcing rigid safeguards. Provide flexible access to z/VM resources and Linux on System z guests. Simplify management across disparate IT exposure points ranging from user access to resource, data, and system audit assets.
  • 17
    Precisely Ironstream
    Integrate mainframe and IBM i systems into leading IT analytics and operations platforms for an enterprise-wide view to support your digital business. In today’s digital, always-on world, IT is arguably the most important department across your organization. A single security breach or service outage can bring your business to a standstill. But knowing what’s happening across an increasingly complex landscape of infrastructure and apps, and resolving issues before they impact the business, is a daunting task. The good news is that there are several platforms to help you monitor IT security and operations across the enterprise in real-time, and take action fast. The challenge, however, is that mainframe or IBM i systems aren’t natively supported by these modern tools. So, if you rely on these critical servers to run your business and you’re managing them in isolation, you have a dangerous blind spot.
  • 18
    Rocket z/Assure VAP

    Rocket z/Assure VAP

    Rocket Software

    Rocket z/Assure Vulnerability Analysis Program (VAP) is a specialized mainframe security solution that scans and analyzes vulnerabilities in IBM z/OS operating system code to help organizations identify, assess, track, and mitigate security risks that could expose critical data. Unlike traditional vulnerability tools that focus on application layers, z/Assure VAP conducts thorough and precise binary code scanning at the OS level to detect zero-day and integrity-based vulnerabilities without relying on signature files, using an Interactive Application Security Testing (IAST)-style approach to pinpoint real weaknesses and guide developers to the exact code requiring remediation. It generates detailed vulnerability disclosure reports that provide actionable insights and clear paths to fix issues, enabling teams to prioritize risk, strengthen defenses, and make mainframe vulnerability management a repeatable part of IT security and compliance programs.
  • 19
    CA Auditor for z/OS
    With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.
  • 20
    SDS VitalSigns

    SDS VitalSigns

    Software Diversified Services

    Every product in the VitalSigns family is a money saver. Each VitalSigns product provides a quick install, an economical alternative to costly legacy products, minimal demand on the mainframe, and 24/7 access to our world-class support team. VitalSigns is a full-spectrum tool set for… Event Log Management and Compliance – VitalSigns SIEM Agent for z/OS FTP Monitoring – VitalSigns for FTP Complete FTP Security – The VFTP/SSH Collaboration IP Monitoring – VitalSigns for IP Network Automation – VitalSigns for Network Automation and Control SNA and IP Monitoring – VitalSigns for VTAM
  • 21
    Tape Encryption
    Designed to be an innovative, flexible, easily implemented, and comprehensive z/OS tape encryption solution. It helps ensure that your data is protected from breaches, even if your tapes fall into the wrong hands. Tape Encryption helps you safeguard your sensitive data and automate full lifecycle key management. And it can be implemented without the need to purchase expensive and complex hardware. With this mainframe solution, you can take steps to shield your company from fines, costly corrective processes, and the negative publicity that can occur when personal and business-critical data are compromised. Tape Encryption helps you implement your security strategy while containing costs. Protect against data breaches and the inherent potential for loss of revenue and negative press. Offers an automated solution to key management that exploits other Broadcom facilities to deliver optimum performance and limit processor overhead.
  • 22
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 23
    Entire Connection
    Terminal emulation software that connects Windows® users to applications on the mainframe, UNIX®, Linux®, OpenVMS, and BS2000 platforms. Available for Natural on the mainframe. Connect thousands of concurrent Microsoft® Windows® users to applications running on the mainframe, UNIX, Linux, OpenVMS, and BS2000 platforms with highly scalable terminal emulation software, Entire Connection. Protect your application from desktop access by requiring a user ID and password to open a terminal session with Entire Connection. Implement SSO by storing the host user credentials encrypted in the share file and using the Entire Connection script language to log onto the host.
  • 24
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 25
    IBM Guardium Data Protection
    IBM Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories—stored on-premises, in private and public cloud and in containers. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.
  • 26
    Rocket EOS 360

    Rocket EOS 360

    Rocket Software

    Simply providing access to reports and data on the mainframe is no longer enough for today’s stakeholders. Your users, whether they’re employees, partners, or customers, increasingly expect a more modern digital experience and efficient workflows. And with more regulation and restrictions across the world impacting data security, you’re expected to protect all data, regardless of platform. Rocket® EOS 360 integrates with mainframe environments to capture output from applications, manage the storage of that data and provide fast and secure access for users. Rocket EOS 360 allows you to allocate precious MSUs to business-critical applications, improving the efficiency of your output management system. Rocket EOS 360 centralizes your data and provides a single, secure point of access to ensure you stay in compliance with any regulations and minimize the risk of a data security leak.
  • 27
    CA SYSVIEW Performance Intelligence
    With CA SYSVIEW Performance Intelligence you can increase efficiency and improve system performance by anticipating issues sooner, analyzing them faster, and automating corrective action. In addition to providing access to the right data across many systems and subsystems, this comprehensive solution turns your data into meaningful and actionable insights that help you better understand what is going on across your hybrid IT environment and what to do about it. Break down silos and access operational data from across your hybrid IT environment using open and secure APIs. Analytics and algorithms have been trained for the mainframe environment and are embedded within our software solutions. View business transactions across application workflows providing end-to-end view mobile to mainframe. Customizable dashboards and reports provide improved resource utilization, performance tuning, problem analysis and resolution.
  • 28
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 29
    Huawei IAM

    Huawei IAM

    Huawei Cloud

    Create IAM users and groups and grant them permissions by using policies and roles, allowing or denying access to specific services and resources. Delegate a trusted HUAWEI CLOUD account or a cloud service to access your HUAWEI CLOUD resources based on assigned permissions. Establish a trust relationship between your existing identity system and HUAWEI CLOUD by creating a SAML-based or OpenID Connect–based identity provider or a custom identity broker. In this way, users in your enterprise can log in to HUAWEI CLOUD through single sign-on (SSO). You can require IAM users to complete identity authentication each time they log in or perform a critical operation. IAM allows you to create IAM users and authorize them to securely access your resources using their own username and password. IAM allows you to authorize another HUAWEI CLOUD account or a cloud service to access your resources based on assigned permissions.
  • 30
    BMC AMI Capacity and Cost
    As digitization increases, so does the complexity of managing mainframe capacity and costs. BMC AMI Capacity and Cost portfolio increases availability, predicts capacity bottlenecks before they occur, and optimizes mainframe software costs that can consume 30-50 percent of the mainframe budget. Balance risk and efficiency to achieve operational resilience with visibility into workload changes that may impact your mainframe availability and business demand. Demystify the management of mainframe software license costs and pricing models, giving quantifiable business insights into technical cost data and their drivers. Diagnose capacity issues before they impact your business with intelligent workflows based on nearly half a century of BMC experience – empowering the next generation of mainframe. Intelligently manage capacity settings of less critical workloads to optimize costs while protecting service levels.
  • 31
    VFI

    VFI

    21st Century Software

    VFI delivers high-value management of batch applications leveraging analytics and automated process, reducing dependency on domain experts and time-consuming resources. It provides end to end operational resiliency and reduction of business risk for mainframe batch application data by providing immediate insight into data inter-dependencies and vulnerabilities. The robust feature set is built on a foundation of near real-time collection and analysis of SMF data. Analysis of data usage patterns and a comprehensive inventory of curated information enables quick, automated recovery of mainframe batch data for operational use or disaster recovery events without reliance on application expertise. VFI delivers a comprehensive inventory of mainframe batch data usage and backups, and a means to automate backups as well as quickly recover data. The end-to-end, integrated solution for mainframe batch data manages all of the application elements to ensure SLA compliance and availability.
  • 32
    LogonBox

    LogonBox

    LogonBox

    Discover the LogonBox Advantage with our innovative solutions for the modern Enterprise. LogonBox is an independent software vendor that develops software to help organizations manage and secure user identities and credentials. LogonBox solutions reduce helpdesk tickets, increase productivity, secure access across heterogeneous enterprises, and protect network resources by extending authentication beyond the password.
  • 33
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 34
    CA IDMS

    CA IDMS

    Broadcom Inc.

    Achieve superior, cost-effective database performance with maximum flexibility using CA's proven, Web-enabled, high-performance mainframe relational database management system. Rock-solid database with reliable, scalable, secure, high-performance and cost-effective database management. Let's you more easily participate in mobile-to-mainframe initiatives, cloud, web, and analytics using open capabilities. Highly scalable to handle ever-increasing business demands, designed for efficiency and to help reduce costs. IDMS users have the ability to quickly and easily access data in order to leverage solutions that analyze system issues, automate processes and alerts, and create intelligent recommendations for tuning. Next-gen users have the ability to execute and automate IDMS administration using common tools and scripting languages. Let’s take a journey in partnership to delve into your project needs.
  • 35
    ibi Open Data Hub for Mainframe
    ibi Open Data Hub for Mainframe provides real-time access to mainframe data, enabling seamless integration with various business intelligence tools. By allowing data to remain on the mainframe, it ensures compliance with security protocols and regulatory standards. The platform reduces the need for custom SQL queries, enhancing productivity and facilitating prompt, informed decision-making. Utilizing zIIP specialty engines, it offers cost-effective data access by offloading workloads from general-purpose processors. This solution empowers organizations to respond swiftly to market trends and customer demands by providing comprehensive, up-to-date business data. Reduce the time to gain access to data by eliminating the need for custom SQL queries so you can retrieve and analyze information faster to ensure faster decision-making. Access the data from the mainframe in real time to develop insights that let you make informed decisions promptly.
  • 36
    Rocket Enterprise Suite
    Rocket® Enterprise Suite is an application modernization solution designed to reduce the risk of mainframe modernization by allowing organizations to migrate mainframe applications in their existing code. This minimizes failure risk and delivers faster project timelines. It supports both COBOL and PL/I workloads and can be deployed on-premises, in the cloud, or in hybrid environments, providing flexibility for diverse IT infrastructures. The suite includes tools for analyzing, securing, accessing, developing, testing, deploying, and migrating mainframe applications. It uses an AI-powered natural language assistant to simplify code analysis, making it easier for teams to understand and document complex mainframe applications and improve DevOps practices. Backed by 40 years of experience and thousands of successful mainframe modernization projects, Rocket Enterprise Suite is built to deliver modern application development with lower project risk and increased development speed.
  • 37
    IBM Hyper Protect Virtual Servers
    IBM Hyper Protect Virtual Servers take advantage of IBM Secure Execution for Linux. It provides a confidential computing environment to protect sensitive data running in virtual servers and container runtimes by performing computation in a hardware-based, trusted execution environment (TEE). It is available on-premise as well as a managed offering in IBM Cloud. Securely build, deploy, and manage mission-critical applications for the hybrid multi-cloud with confidential computing on IBM Z and LinuxONE. Equip your developers with the capability to securely build their applications in a trusted environment with integrity. Enable admins to validate that applications originate from a trusted source via their own auditing processes. Give operations the ability to manage without accessing applications or their sensitive data. Protect your digital assets on a security-rich, tamper-proof Linux-based platform.
  • 38
    REVE Secure

    REVE Secure

    REVE Secure

    Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices.
  • 39
    Jolly Giant

    Jolly Giant

    Jolly Giant

    Reliable, fast, efficient and secure Windows® O/S to IBM mainframe and AS/400 connectivity solutions and support, now with web and mobile interface options. Using TCP/IP and the Winsock interface, this application allows you to quickly connect to your IBM mainframe over LAN and dialup connections. QWS3270 Secure is a 3270 emulation application that allows PCs to connect to SSL enabled IBM mainframes over a secure TCP/IP connection. Using TCP/IP and the Winsock interface, this application allows you to quickly connect to your A/S400 over LAN and dialup connections. WIRE offers a web based modernization platform to enhance and improve the user interfaces of mainframe applications and deliver them to web and mobile platforms,
  • 40
    Bravura Privilege

    Bravura Privilege

    Bravura Security

    Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Bravura Privilege secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster. Bravura Privilege grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premises or in the cloud. Discovers and classifies privileged accounts and security groups. Randomizes passwords and stores them in an encrypted, replicated vault.
  • 41
    Precisely Connect
    Integrate data seamlessly from legacy systems into next-gen cloud and data platforms with one solution. Connect helps you take control of your data from mainframe to cloud. Integrate data through batch and real-time ingestion for advanced analytics, comprehensive machine learning and seamless data migration. Connect leverages the expertise Precisely has built over decades as a leader in mainframe sort and IBM i data availability and security to lead the industry in accessing and integrating complex data. Access to all your enterprise data for the most critical business projects is ensured by support for a wide range of sources and targets for all your ELT and CDC needs.
  • 42
    CA Compliance Event Manager
    Non-compliance can result in out-of-control costs and a serious impact to the bottom line. CA Compliance Event Manager helps you establish continuous data security and compliance. Gain deeper insight into your enterprise’s risk posture, protect your business, and comply with the regulations using advanced compliance management tooling. Monitor users, security settings, and system files and alert to changes and suspicious activity for complete oversight of your security systems and data. Get real-time notifications to proactively address potential threats. Filter critical security events and forward to SIEM platforms for a holistic view of your security infrastructure. Reduce costs by minimizing the number of security alerts undergoing real-time analysis. Inspect the source of incident with detailed audit and compliance information for deeper insights into your risk posture.
  • 43
    UKM Universal SSH Key Manager

    UKM Universal SSH Key Manager

    Software Diversified Services

    UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance.
  • 44
    BMC Compuware Topaz Connect
    BMC Compuware Topaz Connect bridges the IT systems that manage mainframe applications with the modern tooling used to manage non-mainframe applications, eliminating siloes that can disrupt innovation. By connecting the mainframe to disparate platforms in the enterprise, companies can track processes for mainframe applications in the same manner as they do for other hardware and software platforms. Eliminates siloes created by lack of integrated tooling, enabling faster delivery of business value. Maximizes enterprise IT automation by reducing disparate manual processes. Leverages existing IT service management (ITSM) investments. Includes the mainframe in DevOps processes. Enhances process efficiencies. Enables mainframe-inexperienced programmers to manage mainframe code. Connect BMC Compuware ISPW and ITSM solutions such as BMC Helix and Tivoli. Communicate specifics of an ITSM code change to BMC Compuware ISPW.
  • 45
    Entitle

    Entitle

    BeyondTrust

    Entitle fuses a security-first approach to provisioning and governance, with a commitment to business enablement for all teams, from R&D and sales to H&R and finance. Speed up provisioning to unlock security policies that automatically update with changing infrastructure and employee needs. Grant permissions to specific resources, like Google Drive folders, database tables, Git repositories, and more. Keep privileged resources and roles safe by granting access only when needed, and removing them when not. Give peers, managers, and resource owners the power to approve access requests, for authorizations you can trust. With automated access requests and zero-touch provisioning, DevOps, IT, and all teams can save serious time and resources. Users can request access to what they need via Slack, Teams, Jira, or email for a seamless approval process. Grant bulk permissions for fast onboarding and offboarding to keep up with organizational changes.
  • 46
    AWS Mainframe Modernization
    AWS Mainframe Modernization service is a unique platform that allows you to migrate and modernize your on-premises mainframe applications to a cloud-native fully-managed runtime environment on AWS. Migrate and modernize your applications to remove the hardware and staffing costs of traditional mainframes. Break up and manage your complete migration with infrastructure, software, and tools to refactor and transform legacy applications. Accelerate modernization and regression testing at scale, with a cloud-native service. AWS Mainframe Modernization is a set of managed tools providing infrastructure and software for modernizing, migrating, testing, and running mainframe applications. Accelerate your mainframe modernization journey. Improve modernization outcomes using domain expertise. Reduce project complexity and enhance cross-functional collaboration. Automate transforming legacy language applications into agile Java-based services with AWS Blu Age using newer web frameworks.
  • 47
    BMC AMI Ops Monitoring
    BMC AMI Ops Monitoring (formerly MainView Monitoring) provides centralized control of your z/OS® and z/OS UNIX® environments, taking the guesswork out of optimizing mainframe performance. It reduces monitoring costs, ensures system availability and performance, and minimizes the risk of business services being unavailable. Get a comprehensive view of your entire z/OS environment, including z/OS UNIX, to ensure your mainframe meets the needs of today’s digital business—rapidly, efficiently, intuitively, and at a lower cost. No need to choose—highly efficient resource usage and common data collection lowers costs while ensuring availability. Tight integration with intelligent proactive automation prevents problems before they happen. Guided navigation to the source of a problem lowers MTTR. Dynamic analytics-based thresholds pinpoint potential problems while improving staff efficiency and effectiveness.
  • 48
    Multifactor

    Multifactor

    Multifactor

    Multifactor is a next-generation account-sharing and access-management platform built around zero-trust, post-quantum cryptography, and fine-grained permissioning. Rather than simply sharing credentials, users store their online accounts (passwords, passkeys, 2FA codes) in a secure vault and grant access to humans or AI agents by sending controlled links. Access can be revoked instantly, and the underlying credentials remain hidden. You can define precise permissions (for example, “read transactions” but not “initiate transfers”), capture detailed non-repudiable audit trails of every action, and enjoy built-in encryption and post-quantum security architecture that ensures only authorized parties ever gain access. The platform can also operate as a full identity-and-access-management suite, supporting authentication (biometrics, hardware tokens), authorization, access auditing, device and network endpoint enforcement, and secure account/resource sharing.
  • 49
    SAASPASS

    SAASPASS

    SAASPASS

    Move Beyond Passwords with The Only Full-Stack Identity & Access Management Solution. SAASPASS is Your Key to the World. Say Goodbye to Passwords EVERYWHERE. Secure Authentication Made Magical. Personal Use. Protect Yourself. Company Admins. Protect Your Employees. Developers. Protect Your End Users. Control and instantaneously manage network access by employees and partners. Eliminate the manual typing of passwords and the resources involved with password complexity rules and resets. Replace ID cards, single sign-on products, and password managers with a single, easy-to-use solution. Secure every access point to your corporate network, personal data, physical door, or IoT device using out-of-band MFA with dynamic passcodes. Login to your Mac or PC instantly, with full MFA, even when offline. Authenticate to cloud-based and on-premise apps securely and seamlessly. Eliminate password & data breaches and their impact on you or your organization. Eliminate the costs and risks
  • 50
    Rocket Passport

    Rocket Passport

    Rocket Software

    Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows.