Orange Cubes

“I would recommend MegaCryption because it does what it says, handles our current needs and future needs that will arise, has more functions than other products, and the cost of the product was great. I would rate the technical support as a 10.”
- Major Northeast University

Naples, FL – December 2014 MegaCryption now offers the ability to encrypt and decrypt individual records for usage in a specific program or transaction, commonly known as record-level encryption, through its Record-Level Encryption Adapter (RLEA). As a record-level and file-level cryptography solution, MegaCryption provides a comprehensive approach to encrypting virtually any record and file in […]

Naples, FL – November 2014 Advanced Software Products Group (ASPG) has released version 1.4.3 of CryptoMon, its mainframe software specifically designed to display valuable information which may be missing or unreported (errors, keys or digital certificates set to expire, etc.) CryptoMon is the ideal product for enterprise data centers that make an everyday use of […]

Naples, FL – October 2014 Advanced Software Products Group, Inc. (ASPG) has released version 2.0 of MegaCryption-PC and MegaCryption-IX, the fastest growing encryption tool for file cryptography on Windows, Unix, and Linux computers. MegaCryption-PC, for Windows, and MegaCryption-IX, for Unix and Linux, may be freely distributed for use on Windows, Unix, or Linux systems and […]

Data security doesn’t happen by accident. In a large organization, it comes from the combined efforts of a number of people within the organization working together to discover and address security vulnerabilities. The title of this post is obviously a play on the late Stephen Covey’s book, The Seven Habits of Highly Effective People, and […]

Businesses of all sizes are susceptible to having a breach in their data security. Whether your clients number in the hundreds, thousands, or millions, the way you respond to a security crisis will leave a lasting impression on your organization’s reputation. A good response to a security breach can help limit the fallout of the […]

Properly encrypting and storing backups is essential for recovery from a system failure or massive data loss. While they have some similarities, data backup and disaster recovery planning require different tools and processes. The primary purpose of data backup is to make it possible to restore your information to use should the original copies become […]

Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system and policies. Mainframes must be able to maintain high availability […]

It’s not all hackers and thieves out there — human errors, natural disasters, and hardware failure are all potential sources of data loss. Here are some things to think about when planning your company’s data backup strategy. Data security is an issue that all organizations must take seriously. But data security is not just about […]

Encryption is worth doing the right way. Here are some things to think about for your company’s encryption strategy. It’s common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful tool in protecting the security and privacy of data. But […]

Sometimes the threats we face aren’t in the Cloud — they’re in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization’s data against external threats. Hackers and other cyber criminals pose a risk to organizations, but so do employees, especially since they have […]