Try our new research platform with insights from 80,000+ expert users

ACF2 vs Protegrity’s Data Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ACF2
Ranking in Database Security
16th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
6
Ranking in other categories
Mainframe Security (6th)
Protegrity’s Data Protectio...
Ranking in Database Security
7th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
3
Ranking in other categories
Data Governance (18th), Data Masking (5th)
 

Mindshare comparison

As of April 2025, in the Database Security category, the mindshare of ACF2 is 0.6%, down from 0.7% compared to the previous year. The mindshare of Protegrity’s Data Protection Platform is 0.7%, down from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Database Security
 

Featured Reviews

reviewer1077621 - PeerSpot reviewer
A reliable, scalable product for security and auditing of our mainframe environment
It is a good product. It has been used for years. As long as it is configured correctly, it is a very stable product. It depends on how an institution or a company configures it. It depends on an institution's risk appetite. You need to make sure it is configured as per the concept of least privilege, and the logging features, detection and control mechanism, and other things like that are enabled. If you configure it to give access to the public, then there could be compromises. You should also have someone who independently checks it to make sure that it is configured keeping security in mind. If it has been configured for a while, when there are enhancements to the product or when you enhance it, you need to make sure that security is also looked at, and it is configured according to an institution's security policies. I would rate it a nine out of 10.
Vinoth Raj Prabhakaran - PeerSpot reviewer
Beneficial data security, good support, and straightforward initial setup
The initial setup of Protegrity Data Security was straightforward. However, we had a few problems, it's not multi-tenanted. It does not have a hierarchy of roles and differential priorities. To have the initial sandbox version of Protegrity Data Security up and running, took approximately one week. However, it needed to be set up in a resilient way because if it fails, then it is going to be a challenge bringing back the lost information. We have to be particular in terms of architecting it correctly which is taking us a bit of time. We are anticipating anywhere between four to six weeks to be finished.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I love their support. The support is great. They are number one."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"Excellent real-time reporting that saves time and resources."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"Its technical support team is helpful."
"The solution’s pricing is moderate."
"The most valuable feature of Protegrity Data Security is the reduction of information being exposed."
"The product is stable."
 

Cons

"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​"
"It needs longer rules. The max rule is 32K."
"Reporting can sometimes include false positives."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"Protegrity Data Security could improve by having more integration."
"The solution's UI could be better."
"Protegrity is using a different OS which has some bugs. Sometimes it's causing an initialization error."
 

Pricing and Cost Advice

Information not available
"We pay for a few additional services apart from its licenses."
report
Use our free recommendation engine to learn which Database Security solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
33%
Computer Software Company
11%
Manufacturing Company
8%
Retailer
8%
Financial Services Firm
36%
Computer Software Company
10%
Manufacturing Company
7%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is a good length for a password in ACF2 so it's safe?
A set length of 12 characters can ensure the safety of a system. Longer passwords provide an added layer of security, especially when combined with other password complexity requirements. With a le...
Is ACF2 suitable for beginners?
ACF2 can be suitable for beginners with the right guidance and support. While it may have a steep learning curve for many due to its complexity, it offers extensive documentation and resources that...
What types of auditing and reporting capabilities does ACF2 offer?
ACF2's reporting capabilities are highly valuable. It offers various predefined reports that provide insights into our system's security posture. These reports include information on user access pr...
What needs improvement with Protegrity Data Security?
Protegrity is using a different OS, which has some bugs. Sometimes, it's causing an initialization error.
What is your primary use case for Protegrity Data Security?
We use the solution to encrypt sensitive data like PII data. Any unauthorized person cannot find the exact sensitive value in case of data issues. We are using that tool to protect sensitive data.
 

Also Known As

CA ACF2
Protegrity Data Security
 

Overview

 

Sample Customers

Sky, Rogers Communications
A $4 billion retail conglomerate and holding company
Find out what your peers are saying about ACF2 vs. Protegrity’s Data Protection Platform and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.