+
+

Related Products

  • Reflectiz
    29 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • HERE Enterprise Browser
    2 Ratings
    Visit Website
  • Dynamo Software
    68 Ratings
    Visit Website
  • Feroot
    28 Ratings
    Visit Website
  • D&B Risk Analytics
    80 Ratings
    Visit Website
  • Perplexity Computer
    26 Ratings
    Visit Website
  • Asym Capital
    1 Rating
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.

About

A comprehensive security and directory management system for z/VM. It’s designed to help you minimize risk by establishing rigid safeguards and controlling access to z/VM and Linux on System z guest resources. V:M Secure for z/VM helps prevent inadvertent security exposures by automatically maintaining synchronization between the z/VM user directory and your security rules. It helps make it easier to enforce IT-wide security practices automatically, identify security offenders, and produce complete security reports and audit listings. Control over access to all system resources. Delegation of disk space management and automated direct access storage device (DASD) relocation. Minimize security risk of z/VM environment by enforcing rigid safeguards. Provide flexible access to z/VM resources and Linux on System z guests. Simplify management across disparate IT exposure points ranging from user access to resource, data, and system audit assets.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises searching for a software solution to identify and control z/OS security exposures

Audience

Organizations interested in a tool to secure their access to their assets

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/compliance-data-protection/auditor

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/mainframe/product-portfolio/vm-secure-zvm

Alternatives

Alternatives

CA Cleanup

CA Cleanup

Broadcom
SDS IronSphere

SDS IronSphere

Software Diversified Services
CA Cleanup

CA Cleanup

Broadcom
Tectia

Tectia

SSH Communications Security

Categories

Categories

Integrations

Delinea Cloud Access Controller
IBM z/VM
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF

Integrations

Delinea Cloud Access Controller
IBM z/VM
Symantec Advanced Authentication
Symantec Advanced Threat Protection
Symantec Asset Management Suite
Symantec Client Management Suite
Symantec Control Compliance Suite
Symantec Data Center Security
Symantec Data Loss Prevention
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Encryption
Symantec IGA
Symantec PAM
Symantec SiteMinder
Symantec VIP
Symantec WAF
Claim CA Auditor for z/OS and update features and information
Claim CA Auditor for z/OS and update features and information
Claim V:M Secure for z/VM and update features and information
Claim V:M Secure for z/VM and update features and information