<p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Field-Level Security for the MVS environment Mainframe Compliance with PCI-DSS, SOX, HIPAA and others</font></p><ul><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Data protection and masking down to field-level</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">DB2, IMS and VSAM</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Extended security, seamlessly integrated with RACF and TS</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Easy authority management for CICS resources at all levels</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Monitoring and auditing of user activity and security events</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Monitoring of security officer activity</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Menu generator</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Application-independent</font></p></li><li><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Optional GUI Client and extended auditing </font></p></li></ul><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Bsafe/Security for CICS is the answer to auditors' requirements of internal controls for the protection and auditing of your data. It addresses the difficult demands of industry and legal regulatory compliance like PCI, SOX and HIPAA through data protection, privacy and an easy-to-understand audit log.<br /><br /><strong>Field-Level Data Protection and Masking (for DB2, IMS and VSAM)</strong><br />Data can be protected at the file, record and field level within VSAM files, DB2 tables and IMS records. Authorization at the record and field level is determined by rules you set up, based on field values. Sensitive fields can be protected from update or even masked from view for unauthorized users, while non-critical data in the same file can be left with full visibility.<br /><br />For DB2, protection can be implemented at the table level, independent of application or PLAN. Moreover, you can restrict access (or mask) down to the column level, according to column value. The data protection is application-independent, operating at the system level and applying to all current and future applications.<br /><br /><strong>Extended Security, Seamlessly Integrated with RACF and TS</strong><br />Bsafe/Security for CICS is a rich set of advanced security components which integrate seamlessly with RACF and other basic security systems. It authenticates passwords against the RACF security system for unity of passwords between the systems.<br /><br /><strong>Easy Authority Management for CICS Resources at All Levels</strong><br />Alongside field-level authorization, Bsafe/Security for CICS provides easy and user-oriented authorization management of other resources as well. Each user or profile is granted authorization to the resources they require - transaction, terminal, program, file, record (by field value) and individual field.<br /><br />Authorizations can be multi-level involving different combinations of resources i.e. user permitted to specified files for certain transactions.<br /><br />With Bsafe/Security for CICS the security officer defines CICS authority through clear menus and easy-to-understand, structured screens. Definitions made can be reviewed and changed quickly and simply with no need to remember the format of commands. Changes and additions are made on a full screen while the current authorizations for the user are displayed. Following the changes made, the full updated state of authorizations remains displayed on the screen for confirmation of the updated values.<br /><br />The handling of authorities is further aided by the way you specify authorized resources for a user. You can choose the specific resources (transaction, file etc.) to which the user is authorized, or decide that the user is authorized to all resources of a certain type, except those specified.<br /><br />Alongside the product’s powerful online update is a mass update facility to make large numbers of authorization definitions in batch. A full set of reports can be produced including details of all authorizations and policies defined in the system and statistical reports like inactive users.<br /><br />All authorizations defined by Bsafe/Security for CICS are independent of application, operating at the system level and applying to all current and future applications. Authorization definitions are facilitated by group authorities for users and resources, reducing the time required for implementation and maintenance.<br /><br />This user-oriented approach of Bsafe/Security for CICS means that the security officer can manage security in an easy, natural and logical manner. The result is a reduction in the time and costs required for administrator activity and training in comparison to other solutions.<br /><br /><strong>Monitoring and Auditing of User Activity and Security Events</strong><br />Bsafe/Security for CICS incorporates an audit log of security events. The security officer can view the log in real-time, filtered by various parameters including user, event type, date and time.<br /><br /><img src="http://bsafesolutions.com/CICS%20Security/bsafe_security_cics_mvs.files/p1.jpg" border="0" alt="BSafe_Security_CICS_Monitoring_Auditing" title="BSafe Security CICS Monitoring Auditing" width="379" height="275" /><br /></font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"> </font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">The audit log can be viewed on-line and reports can be printed with or without filtering of the events. In addition, the printed reports can be sorted by a variety of criteria.<br /><br /><strong>Menu generator</strong><br />Bsafe/Security for CICS incorporates a menu generator to create menus for end users. Your users will be able to run clearly-named tasks rather than having to remember transactions and parameters.</font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"><img src="http://bsafesolutions.com/CICS%20Security/bsafe_security_cics_mvs.files/p2.jpg" border="0" alt="BSafe_Security_CICS_MVS_Menu_Generator" title="BSafe Security CICS MVS Menu Generator" width="379" height="275" /><br /><br />This improves user-friendliness, reduces the chances of executing transactions wrongly and prevents users from attempting to run transactions not meant for them. The security officer can update the user menus on-line, quickly and simply, even while the users continue to work. Restriction by menu is an additional layer of protection, on top of user authorizations to resources.<br /><br /><strong>Bsafe/Security Server for CICS (Optional)</strong><br />The Bsafe/Security Server provides the organization's applications with a means of receiving security information from Bsafe/Security for CICS.<br /><br /><strong>User Activity Tracking</strong><br />For selected users, monitor usage of specific transactions and programs and access to defined field values. This is done while the user works normally, without being aware of any tracking.<br /><br /><strong>Alerting</strong><br />The product features a real-time IDS (intrusion detection system) in which alerts can be issued following specific events. For example, users attempting to log on from unauthorized terminals.<br /><br /><strong>Decentralization of Administration</strong><br />Bsafe/Security for CICS allows you to distribute administration functions by defining different functions and control for different administrators. For example, you can create a restricted security administrator who can add new users and assign them to existing profiles, but cannot add or change authorizations to access resources.</font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"><img src="http://bsafesolutions.com/CICS%20Security/bsafe_security_cics_mvs.files/p3.jpg" border="0" alt="BSafe_Security_Mainframe_CICS_Administration" title="BSafe Security Mainframe CICS Administration" width="379" height="275" /><br /><br /><strong>On-line Help</strong><br />The product features detailed help screens to assist the administrator in making the required definitions.<br /></font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"><img src="http://bsafesolutions.com/CICS%20Security/bsafe_security_cics_mvs.files/p4.jpg" border="0" alt="BSafe_Security_Mainframe_CICS_Help" title="BSafe Security Mainframe CICS Help" width="379" height="275" /><br /><strong><br />Optional Add-ons</strong><br /></font></p><blockquote><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"><strong>1. Windows-based GUI Client</strong></font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Bsafe/Security for CICS may be managed through a Windows-based GUI called Bsafe/Enterprise Security for System z.</font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066"><br /><strong>2. Cross-Platform Audit (CPA)</strong></font></p><p><font face="arial,helvetica,sans-serif" size="2" color="#000066">Audit data collected by Bsafe/Security for CICS can be downloaded to Bsafe’s PC-based database application which consolidates audit data from multiple machines and multiple platforms for mouse-click analysis and reporting. It also serves as a means of freeing up expensive mainframe disk space if you wish to purge the files after transfer to the CPA.</font></p></blockquote>