Mainframe Access Management
Published on December 23, 2013
One of the most compelling features of the mainframe is how it allows so many processes to run simultaneously. The mainframe's design allows it to have many users performing a variety of actions day after day without rest. Because mainframes are able to do so…
Protecting Mission Critical Systems Through Data Encryption
Published on December 20, 2013
Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…
Who’s Already Using Encryption?
Published on December 17, 2013
If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…
Password Reset Security Risks
Published on December 3, 2013
For most software and online service accounts, passwords are the main line of defense. However, it is common for many users to have dozens of user accounts for different apps and services. Security requirements dictate that each password have sufficient complexity and be updated periodically.…
New MegaCryption Functionality Enhances Business and Cryptography Server Capabilities
Published on November 26, 2013
Naples, FL—November 2013 Advanced Software Products Group’s (ASPG) latest announced enhancements to MegaCryption feature cryptographic key centralization and position the encryption software as business and cryptography server of choice for many enterprise-grade businesses. The latest MegaCryption release, with its focus on centralizing key portability and…
From the Mainframe to the Cloud
Published on November 25, 2013
Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…
Big Data requires Big Security
Published on November 18, 2013
Every day, large organizations are flooded with the data generated in the course of doing business. Figuring out what to do with that data--how to leverage and benefit from it--as well as determining how to safeguard it are some of the hot topics emerging in…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…
Renewing Your Company’s Commitment to Security
Published on November 4, 2013
At one point, your company may have made the decision to take security more seriously. It might have been a strategic initiative, or it might have been in response to a past security breach. The CEO might have addressed the company or sent out a…
ReACT v.3.5.2 Adds Authentication Image to Multi-Factor Authentication Capabilities
Published on October 31, 2013
Naples, FL—October 2013 Advanced Software Products Group (ASPG) has announced the latest release of its popular ReACT software for Help Desk centers and other users requiring a self-service password reset solution. The release features the addition of authentication image technology to further enhance its multi-factor…