NewEra Software is a proud sponsor of the zExchange - A community of z/OS Citizens

OUR GOAL?
Support & maintain system Integrity

ICE/Applications - built, distributed & supported by NewEra Software, Inc

system management can be Difficult

A management paradox known all too well - too much security or too little - just not a good thing.

ICE/TCE provides the operational balance needed between systems programmers, who must have access to critical z/OS resources, and the desire of security officers, compliance managers, and auditors, to establish effective management controls – controls that monitor for compliance, that detect and report changes.

ICE/TCE - the Control editor

About ICE/TCE

ICE/TCE is a z/OS system software utility designed to assist z/OS System Programmers who are charged with the responsibility of supporting and maintaining the z System environments. It's intuitive, easy to use 3270 interface provides ISPF access to critical z/OS system configuration datasets. It tracks and logs their work every step of the way, assuring them of the availability of automatic backups should recovery become necessary. 

ICE/TCE manages access controls at both the dataset and member level, creating a secondary layer of control, augmenting that provided by the External Security Manager(ESM). Many, in management, considered it a ‘Compensating Control’, filling a long-standing functional gap between conventional Change Management Tools and the ESM. 

ICE/TCE is fully under the control of the z/OS Administrator. Using a 3270 Interface, Control Boundaries (Categories, Datasets, Commands, System Messages, LOAD Libraries and UNIX files) are easily defined. Within each boundary, agents are vigilantly checking access rights and recording changes. Changes, even those made outside the TSO/ISPF domain, are captured and reported. All changes are permanently stored in Control Journals for use in interactive or batch Forensic and Periodic Management Reports. 

ICE/TCE can operate, at the user’s direction, as a tool active on each LPAR, tracking, controlling, and reporting activity that occurs on that LPAR. It can also operate on a SYSPLEX-wide basis, monitoring and controlling all activity occurring on all LPARS within a SYSPLEX. 

ICE/TCE provides Automatic Backups, Change History, Restore Points, Component Inspection, Change Impact, Change Descriptor, Member Level, and JOB Submission Control, all of which is designed to reinforce existing ESM defined access boundaries. 

You're in Control

ICE/TCE allows your team to maintain the highest levels of internal control as demanded by regulation and/or your own best practices. In doing so, ICE/TCE addresses the most basic issues associated with internal control over the z/OS configuration - namely, WHO is making changes - with all the attendant detail: the what, when, where, and how. 


Your team's work is managed and fully documented. You're in control: no ifs, no ands, no buts. 

ICE/TCE ENCOURAGES BEST PRACTICES

We all make mistakes.

The support and maintenance of z/OS is complicated. Fortunately, sound z/OS systems programming best practices are well known and straightforward. But we’re all human, all busy, we all forget and our best intentions to conform to these practices will sometimes go unfulfilled.Does your team always:

  • Take a Backup before making changes to z/OS Configuration components?
  • Test changes to PARMLIB, PROCLIB, JCLLIB before committing them to production?
  • Review the History of prior changes before attempting new ones?
  • Document actual changes at the point where the change takes place?
  • Notify those with a need to know that a change has actually been made?

This could be a real problem. No Backup, no Test, no Review, no Documentation, no Notification. Any of these can lead to a loss of z/OS configuration integrity or compliance or worse - to a loss of z/OS availability.


ICE/TCE is the System Software Utility that enhances the use of TSO/ISPF for experience System Programming Staff by fully automating, step-by-step, the individual tasks that will lead them to compliance with the best z/OS systems programming practices. Those new to z/OS System Programming will come up to speed sooner, develop greater confidence in their skill, make fewer mistakes. We all do! ICE/TCE can help to reduce the impact on system operations.


Supports RACF, ACF2 & Top Secret

ICE/TCE Builds and Maintains a Secondary Layer of Access Control

ICE/TCE enhances the TSO/ISPF experience for z/OS System Programmers by fully automating, step-by-step, the individual tasks that will lead them to compliance with the best z/OS systems programming practices.


ICE/TCE strikes a balance in design and implementation between the need for enhanced productivity and the control remediation needs of z/OS System Administrators by compensating for acknowledged weaknesses in their Legacy Security Manager Processes. Consider the following:

  • Do “READ” only users alter JCL, submit and cancel out?
  • Do outside consultants need access, view/update, to everything in PROCLIB?
  • Do Application Programmers need access, view/update, to everything in PARMLIB?
  • Do established policies enforce accountability when PARMLIB is shared across functions?
  • Do controls over APF Authorization result in assigned responsibility?
  • Do access rights to network configurations invite mainframe intrusions?

These examples are but a few of a growing list of issues that inch us ever closer to a state of non-compliance and insecurity when actual control over z/OS configuration changes is brought into question. All speak to a need for the collection and reporting of configuration event detail beyond that supported by legacy systems, for example, the System Management facility (SMF) and conventional Change Management processes.


These examples demand answers to the questions of responsibility and accountability between colleagues and consultants and speak to the need for enhanced z/OS configuration control - control within the dataset boundaries provided by Legacy Security; control that focuses on the individual configuration members that ensure the integrity of your z/OS environment.


ICE/TCE, resolves these issues, fully supports existing Legacy Security and extends the z/OS security  and control boundaries to heretofore unrecognized events, capturing and reporting them as they occur in real time, enforcing Library and Member Level control over both authorized and unauthorized catalog actions and member  updates/reads.

What users are saying about ice/tce

Now I know what's going on

Contractors come and go here all the time. We give them pretty much the same access we give to our own system staff. Until we began using ICE/TCE, we had no idea what they were actually doing. Now we do. ICE/TCE reporting and query functions resolved this completely. I now know who did what, to what, and when. 

Capturing Command Usage

We give operators access to MVS commands for dynamically reconfiguring z/OS. We were hesitant to use strict COMMAND class control for fear of locking them out. Now, leveraging the recording of commands provided by ICE/TCE, we have a way to capture what they are doing. No lockouts; all changes are now fully documented.  

Management Appreciation

I cannot tell you how many times I have had to get involved in a system security dispute between my Security Officer and System Programming Manager. Both are well-intended: one wants more security of z/OS system changes, the other says ‘no way’. The Control Editor resolved this for me, for us. It was easy to set up, a snap to learn.

ICE/IFO, like all NewEra Software Products, is licensed on an MSU, tiered price scale, 

for a defined term or in perpetuity by CPU, Site, Region or Globaly. 

Maintenance is included in the first license year and thereafter is 15% of the then current list price.

Contact Us

NewEra Software, Inc.

18625 Sutter Boulevard, Suite 950, Morgan Hill, CA 95037, US

(800) 421-5035

We're here for you, ready to help.

Cancel