Rocket Secure Host AccessRocket Software
|
||||||
Related Products
|
||||||
About
IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
|
About
Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Teams in search of a solution to protect their mainframe resources and manage and control access to valuable data
|
Audience
Rocket® Secure Host Access is designed for enterprise IT and security teams in regulated industries that rely on mainframe or host applications and need phishing-resistant, compliant, and modern terminal access
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and VideosNo images available
|
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIBM
Founded: 1911
United States
www.ibm.com/products/resource-access-control-facility
|
Company InformationRocket Software
Founded: 1990
United States
www.rocketsoftware.com/en-us/products/secure-host-access
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
|
|
|