• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Cryptography

Closing the Gaps in Your Data Security

Published on May 20, 2014

Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system…

The Common Sense Backup Strategy

Published on May 13, 2014

It's not all hackers and thieves out there -- human errors, natural disasters, and hardware failure are all potential sources of data loss. Here are some things to think about when planning your company's data backup strategy. Data security is an issue that all organizations…

What to Do Before Encrypting Your Data

Published on May 5, 2014

Encryption is worth doing the right way. Here are some things to think about for your company's encryption strategy. It's common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful…

Protecting the Mainframe from Internal Security Threats

Published on April 22, 2014

Sometimes the threats we face aren't in the Cloud -- they're in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization's data against external threats. Hackers and other cyber criminals pose a risk…

Are You Making One of These Database Encryption Mistakes?

Published on January 22, 2014

Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…

Protecting Mission Critical Systems Through Data Encryption

Published on December 20, 2013

Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…

Who’s Already Using Encryption?

Published on December 17, 2013

If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…

From the Mainframe to the Cloud

Published on November 25, 2013

Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…

Big Data requires Big Security

Published on November 18, 2013

Every day, large organizations are flooded with the data generated in the course of doing business. Figuring out what to do with that data--how to leverage and benefit from it--as well as determining how to safeguard it are some of the hot topics emerging in…

Image Recognition – Multi-factor Security

Published on November 14, 2013

Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Event
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password