Domain-based security implementation
Enables the grouping of users, applications and the relationships and automatically generates security commands when changed.
By optimizing our mainframe management processes, we can grow our business and revenues. Tom Laudati
, Chief Technology Officer , Blue Hill Data Services