• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Data Security

ASPG Extends ICSF and Key Support with Latest Release of CryptoMon

Published on December 1, 2014

Naples, FL – November 2014 Advanced Software Products Group (ASPG) has released version 1.4.3 of CryptoMon, its mainframe software specifically designed to display valuable information which may be missing or unreported (errors, keys or digital certificates set to expire, etc.) CryptoMon is the ideal product…

Self-Serve Password Resets

Published on November 6, 2014

Usernames and passwords are what most computer applications use to identify users and secure data. But passwords--especially ones complicated enough to be secure--can be difficult to remember. Without an efficient self-serve password reset program in place, employees who forget their passwords or get locked out…

A PGP encryption primer

Published on October 23, 2014

PGP (pretty good privacy) is a program that lets users encrypt data for secure and private communications. A user can encrypt a message with PGP and transmit it knowing that only a user with the matching decryption key will be able to decrypt and read…

Multi-factor authentication for self-serve password resets

Published on October 15, 2014

Self-serve password reset programs help make organizations more productive and keep data secure. In organizations without a self-serve password reset solution, Help Desk staff spend a lot of time resetting passwords. In addition to the time spent resetting passwords, there are many security vulnerabilities inherent…

What to know about mainframe storage media

Published on September 30, 2014

Mainframes are able to work with and process data using many different operating systems, applications, and protocols. They are also able to save that data onto many different kinds of storage media. What follows is a brief overview of some of the most common types…

Data breaches are not inevitable

Published on September 16, 2014

With the number of high-profile data breaches in the news this year, following the breaches of 2013, it would be easy to conclude that these sorts of incidents are an inevitable part of dealing with data. The news stories of data breaches are certainly coming…

Increase security by limiting permissions to the essentials

Published on September 9, 2014

Selecting what data sets each user or group of users has access to greatly impacts your data security. Selecting appropriate user permissions is a necessary balancing act between security and utility. You must find the appropriate balance between limiting the risk of data being lost,…

The Three States of Digital Data

Published on September 3, 2014

Understanding the different states digital data can be in can help you select the kinds of security measures and encryption that are appropriate for protecting it. There are three basic states of data: data at rest, data in motion, and data in use. Below you…

File (over)sharing

Published on August 19, 2014

File sync services like Dropbox, Box, and Skydrive make it very easy to store an individual's data across multiple devices and share it with friends and colleagues. These freely available file syncing and sharing services are incredibly convenient, but also make it possible to inadvertently…

Protect Sensitive Data from Angry Ex-Employees

Published on August 14, 2014

Under ideal circumstances, when employees leave your company, it is on good terms and they are just going off to pursue other opportunities. There is typically a two-week notice period where the employee and company wrap up loose ends, where the employee provides summaries on…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password