Previous Topic: Configuration Best PracticesNext Topic: CA Top Secret for z/OS Control Options


Product Family Review

We recommend that you review the installation and configuration of CA Top Secret for z/OS before installing and configuring CA Top Secret Option for DB2.

Business Value:

CA Top Secret Option for DB2 leverages the security controls of CA Top Secret for z/OS to enable you to control access to DB2 resources, identify usage activity, violation activity, administrative activity, and so on. Because CA Top Secret for z/OS checks the actual resource authorizations, its installation and configuration dramatically affects the integrity and performance of CA Top Secret Option for DB2.

More Information:

For detailed product information, see the CA Top Secret for z/OS Best Practices Guide.