Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • Thinfinity Workspace
    14 Ratings
    Visit Website
  • Stonebranch
    175 Ratings
    Visit Website
  • 1Password
    16,573 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website
  • MongoDB Atlas
    1,650 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,061 Ratings
    Visit Website
  • Proton VPN
    41,009 Ratings
    Visit Website

About

IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Teams in search of a solution to protect their mainframe resources and manage and control access to valuable data

Audience

Companies searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/resource-access-control-facility

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Alternatives

Alternatives

Vanguard Authenticator

Vanguard Authenticator

Vanguard Integrity Professionals

Categories

Categories

Integrations

IBM z/OS
Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
NetThunder

Integrations

IBM z/OS
Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
NetThunder
Claim IBM Resource Access Control Facility (RACF) and update features and information
Claim IBM Resource Access Control Facility (RACF) and update features and information
Claim Tectia and update features and information
Claim Tectia and update features and information