No more typing reviews! Try our Samantha, our new voice AI agent.

ACF2 vs Flow Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ACF2
Ranking in Database Security
15th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Mainframe Security (5th)
Flow Security
Ranking in Database Security
19th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
Data Security Posture Management (DSPM) (22nd)
 

Mindshare comparison

As of April 2026, in the Database Security category, the mindshare of ACF2 is 1.3%, up from 0.6% compared to the previous year. The mindshare of Flow Security is 0.7%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Database Security Mindshare Distribution
ProductMindshare (%)
ACF21.3%
Flow Security0.7%
Other98.0%
Database Security
 

Featured Reviews

reviewer1077621 - PeerSpot reviewer
IT Examiner at a financial services firm with 10,001+ employees
A reliable, scalable product for security and auditing of our mainframe environment
It is a good product. It has been used for years. As long as it is configured correctly, it is a very stable product. It depends on how an institution or a company configures it. It depends on an institution's risk appetite. You need to make sure it is configured as per the concept of least privilege, and the logging features, detection and control mechanism, and other things like that are enabled. If you configure it to give access to the public, then there could be compromises. You should also have someone who independently checks it to make sure that it is configured keeping security in mind. If it has been configured for a while, when there are enhancements to the product or when you enhance it, you need to make sure that security is also looked at, and it is configured according to an institution's security policies. I would rate it a nine out of 10.
reviewer2231631 - PeerSpot reviewer
Chief Information Security Officer at a computer software company with 51-200 employees
It gives us a risk report that helps us refine our process management by highlighting where we might be exposed
Flow's distinctive capability to analyze both data at rest and data in motion grants us the ability not only to get full visibility and classification of the data within our managed databases but also to visualize the data flows both within and beyond our environment. This enables us to achieve a comprehensive understanding of all our sensitive data, even as it traverses through applications, shadow databases, and external services such as third-party entities and SaaS applications. What we aspire to achieve with Flow is extended visibility into the external services themselves, which will allow us to see the data they contain.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"By providing a high level of access control to the z/OS systems, ACF2 allows us to maintain tight controls on dataset and system access and helps us keep unauthorized users from accessing PHI or PII data."
"Know that this tool is a great tool, a good tool to use, because you can quickly automate, quickly provision, and deprovision new users, which is essential when you are bringing new people onboard."
"Logging and monitoring are most valuable. It is for the mainframe environment, and it is at the forefront for security and resilience."
"We use this tool to quickly assign privileges to different users as soon as they come in."
"I am deeply impressed with the quality and depth and breadth of security and functionality in CA’s ACF2 and Top Secret products."
"It is a good product."
"The most valuable feature is strict and reliable access control to CICS Resources."
"The NOACCESS by default is another very good feature. Also, access rules are straightforward, and easy to understand."
"Before implementing Flow Security, we had no mechanism to alert us when third-party contractors were accessing sensitive data or moving it to locations with lower security. Now we know precisely where the data is stored and can assess the risk when someone wants to develop something. Flow Security lowers our risk of a data breach."
 

Cons

"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser."
"I would like my team and me to be able to use simple browsers, like Chrome, to be able to access mainframe data and provision users using the browser.​"
"It needs longer rules. The max rule is 32K."
"It needs longer rules. The max rule is 32K."
"Reporting can sometimes include false positives."
"They can work on its ability to work in a distributed environment. It's a mainframe product. As many companies move to the cloud, depending on what cloud models they choose, such as a public, hybrid, or private cloud, it should be deployable. I am not sure if it can be deployed on those platforms. It has been there since the '50s or '60s, and it's still scalable. It has survived all these years, and it's scalable to many platforms, but I don't know about the cloud."
"They can work on its ability to work in a distributed environment."
"The user access review could also be improved. It produces a lot of false positives."
"It provides a good overview of our infrastructure, but I need more end-to-end visibility, and SaaS is one of the gaps."
report
Use our free recommendation engine to learn which Database Security solutions are best for your needs.
885,444 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Manufacturing Company
14%
Comms Service Provider
10%
Retailer
8%
University
13%
Computer Software Company
11%
Financial Services Firm
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise4
No data available
 

Comparisons

 

Also Known As

CA ACF2
No data available
 

Overview

 

Sample Customers

Sky, Rogers Communications
Information Not Available
Find out what your peers are saying about IBM, Imperva, Oracle and others in Database Security. Updated: March 2026.
885,444 professionals have used our research since 2012.