Modernization Hub

Are You a Vendor? Claim Your Listing

Take control of your product listings. Add verified information, showcase updates, and unlock a Claimed Vendor badge across the directory.

Claim Your Listing Now

Showing 97-120 of 158 products

The Control Editor's architecture is designed for scalability and security within a z/OS environment. The core components include the Data Collector, Report Generator, and Security Manager. The Data...
Consul Insight zLock's architecture comprised several key components designed to enforce security policies on RACF commands within a z/OS environment....
The architecture of zSecure Alert comprises several key components that work together to provide comprehensive security monitoring and alerting. The Alert Engine is...
The architecture of zSecure Audit is centered around several key components designed to collect, analyze, and report on security-related data within a z/OS environment....
The architecture of zSecure Admin is based on a client-server model, designed for scalability and ease of management. The main components include the zSecure Admin...
zSecure Visual's architecture comprises a Windows-based GUI client, a communication layer, and z/OS server-side components. The GUI client provides the user interface for security...
The architecture of zSecure CICS Toolkit is centered around its integration with the CICS and RACF environments on z/OS. The...
Sponsored

Mainframe Modernization Insights

Discover expert strategies and real-world case studies for transforming legacy mainframe systems into modern cloud-native architectures

The architecture of zSecure Manager for RACF z/VM comprises several key components. The Security Server is the central processing unit, responsible for handling user authentication, authorization, and policy enforcement....
The architecture of Tivoli Compliance Insight Manager (TCIM) comprised several key components designed for security event analysis and reporting. The main components included: * **Data Collectors:** These components were responsible...
The architecture of DB2 Audit Management Expert (DB2 AME) consisted of several key components. The Audit Engine was responsible for capturing database events and writing them to audit trails. The...
The architecture of IBM Security Guardium S-TAP for Db2 on z/OS comprises several key components. The S-TAP agent is installed...
The architecture comprises the S-TAP agent on z/OS, the Guardium collector, and the Guardium aggregator. The S-TAP agent reads SMF records, filters relevant data, and transmits...
The architecture of Guardium S-TAP for IMS consists of several key components. The S-TAP agent, running on the z/OS system, intercepts IMS...
Sponsored

Amplify Your Link Strategy

Transform long URLs into branded short links that boost engagement and trust

The architecture of CDB/Audit comprises several key components designed for efficient and secure Db2 auditing on z/OS. The Audit Engine is...
The architecture of zSecure Command Verifier comprises several key components. The Command Interceptor is the core component, intercepting RACF commands. The Policy Engine evaluates these commands against predefined...
The architecture of IMS Audit Management Expert comprised several key components. The Data Collection Module intercepted and logged IMS events, such as security violations, database...
The IMS Database Recovery Control Security Tool's architecture centers on securing RECON datasets and auditing DBRC commands. The main components include a security interface, a command interceptor, and a...
The architecture of Adabas SAF Security centers around the integration of the Adabas database with the z/OS System Authorization Facility...
The architecture of Natural Security comprises several key components: the Security Kernel, the User Management module, the Resource Management module, and the Audit Logging module. The...
The architecture of Natural SAF Security comprises several key components designed to integrate Natural applications with z/OS SAF-compliant security products. The primary components include the SAF Interface,...
The architecture comprises the S-TAP agent, the Guardium collector, and the Guardium management console. The S-TAP agent, deployed on z/OS, intercepts IMS database calls and captures relevant...
Sponsored

Discover India Like Never Before

From Himalayan peaks to tropical beaches - Find detailed guides to India's most breathtaking destinations

The architecture of Infosphere Guardium Database Activity Monitor comprised several key components. Network sniffers captured database traffic by monitoring network...
The architecture of Infosphere Guardium Central Manager and Aggregator comprised several key components. The Central Manager served as the central point of administration, while the Aggregator collected and processed data...

Share Your Product Experience

Help the community by sharing your experience with mainframe products. Your insights help others make informed decisions.

Share Your Experience