+
+

Related Products

  • Reflectiz
    29 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • HERE Enterprise Browser
    2 Ratings
    Visit Website
  • Dynamo Software
    68 Ratings
    Visit Website
  • Feroot
    28 Ratings
    Visit Website
  • D&B Risk Analytics
    80 Ratings
    Visit Website
  • Perplexity Computer
    26 Ratings
    Visit Website
  • Asym Capital
    1 Rating
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.

About

Crypto Analytics Tool (CAT) collects security-relevant information and helps build your cryptographic inventory. Through the graphical client, it is easy to analyze security information. Enterprise-wide overview of all z/OS cryptographic consuming LPARs from a single CAT monitor client. Offers a comprehensive data view of the cryptographic security of the system. Allows monitoring to ensure that keys and cryptographic functions are set up and protected, complying with best practices. Eases policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises searching for a software solution to identify and control z/OS security exposures

Audience

Enterprises needing a solution to analyze and protect their security data

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/compliance-data-protection/auditor

Company Information

IBM
Founded: 1911
United States
www.ibm.com/downloads/cas/D1A50MQ4

Alternatives

Alternatives

AQtive Guard

AQtive Guard

SandboxAQ
CA Cleanup

CA Cleanup

Broadcom
SDS IronSphere

SDS IronSphere

Software Diversified Services

Categories

Categories

Integrations

Delinea Cloud Access Controller
IBM z/OS
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

Integrations

Delinea Cloud Access Controller
IBM z/OS
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF
Claim CA Auditor for z/OS and update features and information
Claim CA Auditor for z/OS and update features and information
Claim IBM Crypto Analytics Tool (CAT) and update features and information
Claim IBM Crypto Analytics Tool (CAT) and update features and information