Try our new research platform with insights from 80,000+ expert users
ACF2 Logo

ACF2 pros and cons

Vendor: Broadcom
4.5 out of 5
429 followers
Post review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the category report

Prominent pros & cons

PROS

ACF2 efficiently assigns privileges to different users quickly upon arrival.
Support is highly praised and considered number one by users.
The NOACCESS by default feature is highly valued and contributes to straightforward and understandable access rules.
Real-time reporting is excellent, saving both time and resources.
Logging and monitoring are highly valued for their contribution to security and resilience in the mainframe environment.

CONS

Reporting sometimes includes false positives.
ACF2 needs longer rules as the maximum rule size is 32K.
The ability to work in a distributed environment needs improvement.
Uncertainty about ACF2's deployability on cloud platforms.
Despite scalability across many platforms, cloud compatibility is uncertain.
 

ACF2 Pros review quotes

reviewer1077621 - PeerSpot reviewer
Jan 13, 2022
Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience.
reviewer1077621 - PeerSpot reviewer
Jun 11, 2019
Excellent real-time reporting that saves time and resources.
it_user779265 - PeerSpot reviewer
Nov 26, 2017
We use this tool to quickly assign privileges to different users as soon as they come in.
Find out what your peers are saying about Broadcom, IBM, Precisely and others in Mainframe Security. Updated: February 2025.
838,713 professionals have used our research since 2012.
it_user811302 - PeerSpot reviewer
Jan 31, 2018
The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand.
 

ACF2 Cons review quotes

reviewer1077621 - PeerSpot reviewer
Jan 13, 2022
They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud.
reviewer1077621 - PeerSpot reviewer
Jun 11, 2019
Reporting can sometimes include false positives.
it_user779265 - PeerSpot reviewer
Nov 26, 2017
I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​
Find out what your peers are saying about Broadcom, IBM, Precisely and others in Mainframe Security. Updated: February 2025.
838,713 professionals have used our research since 2012.
it_user811302 - PeerSpot reviewer
Jan 31, 2018
It needs longer rules. The max rule is 32K.