• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Cryptography

BYOD in enterprises running mainframes

Published on October 15, 2013

BYOD (Bring Your Own Device) is the increasingly popular and common practice of employees bringing their personal devices to use at work. Many people who own laptops and smart phones are more proficient at using their own devices than their work-issued hardware. People tend to…

No News Is Bad News

Published on October 7, 2013

Technology executives run the risk of believing that no news is good news Since IT and mainframe managers are so used to SMS and email alerts warning them of system malfunctions, it becomes harder to seek out and solve the problems that are not glaringly…

Password vs. Fingerprints

Published on September 30, 2013

Biometrics offer an alternative kind of security, but at a cost Apple recently released its new iPhone, the 5s, which is one of the first widespread consumer devices to use biometrics as a primary security feature. The phone allows users to unlock the phone, as…

Big Data Protection: Six Elements You Must Have

Published on September 25, 2013

Big Data can be a high-stakes game. Here's how to minimize your chances of losing. The revelations of the reach of the NSA's PRISM program revealed to the world just how critical privacy, security, and encryption are. Many users discovered that data and communication which…

Password Complexity Requirements

Published on August 15, 2013

Password complexity requirements are designed to protect data. However, some complexity requirements can make data less secure, and some unnecessarily inconvenience users. Password hacks can come about in a number of ways. Passwords can be guessed, hacked by brute force, or stolen, leaving the data…

Four Encryption Mistakes to Avoid

Published on July 10, 2013

Data encryption is an important component of any security strategy, whether on a mainframe or any other computing system. It obfuscates data from people and machines alike, and provides an incredible level of protection against hackers and data thieves. Are you doing encryption right? Here…

Self-Auditing Your Mainframe for Potential Threats

Published on July 8, 2013

Mainframes are big complex systems. Housing and managing the data stored and processed on these systems involves many access points and lots of risks. Because of these numerous risks, it is important to periodically assess the security measures your company has in place to make…

Got multi-factor authentication?

Published on May 14, 2013

Usernames and passwords are the most common way to secure access to software accounts and data. But passwords don't work -- at least not as well as they should, and especially not the way they used to. Sophisticated phishing schemes, brute force attacks, social engineering,…

Top Four Reasons to Compress Data on the Mainframe

Published on May 1, 2013

Thinking beyond simply saving space Frequent flyers know how much space they can gain just by squeezing the air out of their luggage. They can pack for a week-long vacation in the same bag others will over-stuff with clothes for a simple overnight trip. Atoms,…

10 Tips for Securing Encryption Keys

Published on April 17, 2013

Protect your most critical data and your access to it by following these tips for securing encryption keys Strong encryption is a central and essential defense in the battle to protect sensitive data. The process of encrypting data is not that challenging, and the tools…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password