Achieve two-factor authentication for your entire IBM System z mainframe network – or single business transactions – with Defender Mainframe Edition (ME). It enhances security by enabling your organization to authenticate users at three levels: application selection, business transaction or network entry. Defender ME incorporates the latest cryptographic hardware technologies and supports the most widely used password tokens.
Validate users before they enter the network by extending security defenses from the kernel of the individual mainframe systems to the network periphery.
Restrict user access to permitted applications only by using their ID and passwords to log in. And for higher level access, you can require that users provide additional personal token information at the transaction level, the application level or both.
Select a solution that fits your organization’s needs with support for any OATH-compliant token (from any OATH-compliant hardware vendor).
Provides security and reliability, while controlling costs, with support for the RSA SecureID AES token with nine-digit serial numbers and for 128-bit AES tokens. Plus, save hassle for your users with AES tokens as they no longer will need to connect to a RSA ACE®, UNIX or Windows server to be authenticated.
Accelerates message warnings (including NewView alerts) to a central host or operator console.
Supports Multiple Virtual Storage (MVS) systems with Defender’s three levels:
Broadens security outside the VTAM network front end to your users’ business transactions. Requests password validation and user ID from within the transaction to protect your organization’s sensitive transactions.
Allows your users to specify the name of the machine on which they would like to be authenticated, which is especially beneficial if your users access from both home and remote locations.
Defender Mainframe Administration Features
Join One Identity for our biweekly Insight Series of live webinars designed to help you Get IAM Right. Each webinar focuses on a specific area of identity and access management (IAM) and demonstrates real-world solutions that help you overcome the most common IAM challenges.Register for an upcoming webinar or view an on-demand version of past sessions. Each 30-minute webinar will emphasize solving your IAM issues, not on hard selling our solutions.You will receive email n