• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZBehind-the-scenes look at your z/OS cryptography.
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • User Provisioning
        • ProACTManage the end-to-end lifecycle procedures for end-users across the entire enterprise.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
    • Systems
      • Data Management
        • SMFUTILSMF data management utility for z/OS for automating SMF processing.
        • SMFVIEWSMF data examining and repairing tool for z/OS.
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Business

Five Minutes with ASPG President Cathy Thompson

Published on March 31, 2021

Since founding ASPG in 1986 with one product, Cathy Thompson and Lisa Hamilton have grown ASPG into a global software company. Today, ASPG offers dozens of products for z/OS and distributed systems and is proud to have partnerships with some of the most globally-recognized software…

The Future of Successful Remote Work

Published on May 12, 2020

The COVID-19 pandemic has presented a variety of challenges to everyday life. Now that restrictions are slowly being lifted and many of us are grappling with a new normal, we find ourselves asking what our new reality will look like, including the future of remote…

Most common security mistakes employees make

Published on December 4, 2014

Security software can keep data safe. Strong encryption and sophisticated access controls can keep data out of the wrong hands, but for the information in the systems to be useful, employees have to be able to access and manipulate it. The legitimate access granted to…

Protect Sensitive Data from Angry Ex-Employees

Published on August 14, 2014

Under ideal circumstances, when employees leave your company, it is on good terms and they are just going off to pursue other opportunities. There is typically a two-week notice period where the employee and company wrap up loose ends, where the employee provides summaries on…

7 Habits of Highly Secure Organizations

Published on July 15, 2014

Data security doesn't happen by accident. In a large organization, it comes from the combined efforts of a number of people within the organization working together to discover and address security vulnerabilities. The title of this post is obviously a play on the late Stephen…

DDoS Attacks: A Brief Primer

Published on July 2, 2014

DDoS attacks have been in the news and can make life difficult for companies. Here's a little background on these Distributed Denial of Service attacks to help keep you educated and up-to-date. A number of prominent companies have been recently hit by increasingly powerful DDoS…

Data backup and Disaster Recovery

Published on June 19, 2014

Properly encrypting and storing backups is essential for recovery from a system failure or massive data loss. While they have some similarities, data backup and disaster recovery planning require different tools and processes. The primary purpose of data backup is to make it possible to…

Password Reset Security — It Takes Two

Published on June 11, 2014

Users and employees are human, it turns out -- and forget or lose their passwords from time to time, making password resets an important part of any digital security system. But rather than taking up a significant amount of Help Desk employee time and operating…

Risks of Single Sign-on Password Systems

Published on June 3, 2014

Single sign-in (SSO) has some benefits -- and some attendant risks. Here are a couple of easy steps to making your company's SSO system more secure. Single sign-on (SSO) is a method of access control where users are able to login once and gain access…

Understanding and Defending Against Social Engineering Attacks

Published on May 27, 2014

Human targets are often the easiest way for hackers to gain unauthorized access to data. Here are a few ways you can help stop these social engineering attacks before they can even get started. In the context of data security, social engineering involves psychological manipulation…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ProACT

Systems

  • CIM
  • SMFUTIL
  • WizDom
  • SpaceCalc
  • HelpKey

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Facebook profile Twitter profile Twitter profile

Copyright 2023 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password