

Protecting Facilities › Extended Platform Security
Extended Platform Security
CA Top Secret also extends security beyond internal z/OS to the native environments of DB2, and the PC workstation.
- CA Top Secret for DB2 protects seven DB2 resources and replaces cumbersome GRANT/REVOKE processing and cascade effect with proven, simple‑to‑use, CA Top Secret concepts. PERMITs are written in place of GRANTs, and a conversion utility provides a smooth, easy transition.
- CA Top Secret WorkStation combines a fast and easy‑to‑use Windows‑based GUI for single‑point administration of all CA Top Secret z/OS systems with centralized monitoring and reporting of security events throughout a heterogeneous, multivendor environment.
- CA Top Secret for z/OS also offers a number of security options for sites using MVS/ESA APPC conversation processing. The options you choose to use will depend on the nature of the resources being tapped and on the degree of security existing on each conversing system. For example, the security administrator can limit which LUs can be used for conversation processing, what type of security data the inbound transaction program must provide, and which users are authorized to execute that transaction program.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|