The First Real-Time Security Platform Built for IBM z/OS
MainTegrity CSF catches the threats z/OS misses, blocks unauthorized access in under one second, and combines recovery and compliance in one powerful solution.
What Is MainTegrity CSF?
MainTegrity CSF brings modern cybersecurity to IBM z/OS. While most mainframes still rely on outdated or disconnected tools, CSF closes the gap with real-time threat detection, instant response, and guided recovery — all in one platform.
Originally built as a next-generation integrity monitor, CSF now goes far beyond that. It stops attacks in progress, identifies what was affected, and helps teams recover with speed and precision.
CSF installs easily and works with your existing tools. Its browser-based interface makes complex tasks simple, so both experienced mainframers and newer team members can act quickly and with confidence.

Key Capabilities That Set MainTegity CSF Apart
Revolutionary features that make real-time mainframe security possible
Block Ransomware Attacks
Detect unauthorized changes and identify exactly who did it
MainTegrity continuously monitors for unauthorized changes to critical datasets, executables, and configurations. If ransomware or a malicious actor alters your environment, the system not only catches it in real time but pinpoints the source by analyzing SMF records to show who made the change, when, and how.
Block z/OS Authorization Tampering
Stop privilege escalation and security bypasses
MainTegrity catches unauthorized attempts to escalate privileges, impersonate users, or bypass security controls such as RACF/ACF2/TSS. It flags misuse of AC=1, cloned ACEEs, or suspicious changes to security settings, blocking attackers before they gain control.
Identify 40+ Security Gaps
Live violations of z/OS security policy
MainTegrity CSF is the only product that identifies live violations of z/OS security policy and can halt offending tasks immediately. It can also revoke the guilty user's authority on the spot without impacting other workload.
Freeze Threats <1 Second
Lightning-fast response that sets CSF apart
Halt offending tasks and lock out compromised user IDs instantly, interrupting attacks in their tracks while support investigates. This sub-second response is what makes CSF revolutionary.
Top 10 Things MainTegrity CSF Can Do
Comprehensive security capabilities designed specifically for z/OS environments
1. Block ransomware attacks by detecting unauthorized changes
2. Block z/OS authorization tampering and privilege escalation
3. Identify over 40 gaps in z/OS security
4. Automatically verify that all changes are approved
5. Catch and block supply chain attacks
6. Spot early indicators of data exfiltration
7. Freeze and isolate malicious activity in under one second
8. Recover compromised systems faster
9. Feed alerts to your SIEM and ITSM tools
10. Provide mainframe endpoint security using real-time network data
Complete Security Lifecycle: Identify, Protect, Detect, Respond, Recover
MainTegrity CSF supports the full security lifecycle defined by NIST CSF and DORA. From mapping critical assets to stopping active threats and guiding precise recovery, CSF brings speed, control, and visibility to every stage.
1. Identify
Understand what's at risk and define how to protect it.
CSF helps teams map critical assets, assess exposure, and embed recovery strategies where they're needed most.
- Supports risk assessment and governance reporting
- Integrates with recovery planning and asset inventory
- Shares threat intelligence across systems
2. Protect
Prevent threats by securing critical components.
CSF monitors file integrity, enforces whitelists, and validates backups to establish a known-good state.
- Whitelisting and baseline verification
- Protection for datasets, users, and access paths
- File integrity and backup validation
3. Detect
Spot attacks as they happen — not after the damage is done.
CSF detects encryption attempts, unauthorized commands, and suspicious behavior in real time.
- Early Warning and anomaly detection
- Sub-second privilege escalation alerts
- Continuous behavior monitoring
4. Respond
Stop the attacker. Minimize the damage.
CSF can suspend malicious jobs, revoke access, and guide your team through the proper response.
- Auto-suspend rogue batch jobs or TSO users
- Send alerts via SIEM, email, or SMS
- Present customized playbooks in the UI
5. Recover
Restore cleanly and confidently — with no guesswork.
CSF identifies what was affected, recommends the right backup, and automates the recovery steps.
- Immutable and conventional backup coordination
- Surgical restore guidance
- Trusted state verification
What's New in CSF v3.2
Detect and stop data transfers to unknown IP addresses
Revoke offending user IDs when compromised
Flag use of AMASPZAP and VTOC manipulation
Prevent malicious operator commands before damage occurs
Detect suspicious user activity before an attack
Web-based interface for quicker investigation
Monitor abnormal usage patterns and connections
Reduce false positives with intelligent monitoring
Integration Ecosystem
CSF integrates with SIEM tools, backup platforms, identity and access systems, and recovery orchestration tools. It enhances your existing workflows instead of replacing them.
SIEM Tools
CSF integrates with Splunk, BMC AMI, and QRadar for security information and event management.
Backup Platforms
CSF integrates with ServiceNow and Remedy for data backup and recovery processes.
Recovery Orchestration
CSF integrates with IBM, Dell, Hitachi, and Rocket DR for disaster recovery orchestration.
Identity and Access
CSF integrates with RACF, ACF2, and TSS for identity and access management.
Trusted by Industry Experts
"MainTegrity CSF represents a significant step forward for many IBM customers."

"MainTegrity CSF empowers organizations to act faster, mitigate damage, and maintain operational resilience."

Get Started with MainTegrity CSF
Whether you're fighting ransomware, preparing for DORA, or closing visibility gaps in your z/OS environment, CSF can help.