• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Data Security

2024 quantum predictions in computing, AI and cybersecurity

Published on February 5, 2024

Via Sdxcentral In 2024, quantum industry experts from technology companies and analyst firms predict a year rich in quantum technology and hardware advancements and deployments, with an increased focus on securing the digital landscape against quantum threats. The National Institute of Standards and Technology (NIST) expects to complete its…

How a Simple Password Reset Can Ruin Your Customer’s Experience

Published on January 23, 2024

Via Loginradius When done correctly, password resets can be easy and relatively painless for both the customer and the enterprise. By following tips mentioned in this blog, enterprises can ensure that the customers have a positive experience when resetting their passwords. Introduction It's happened to…

51% of users admit to resetting forgotten passwords once a month

Published on January 19, 2024

via Security Magazine New research from Entrust highlights current shifts in identity management. The Future of Identity report focused on passwordless authentication, hybrid identities and personally identifiable information (PII) ownership. Fifty-one percent of respondents admitted to resetting a password at least once a month because they can’t remember…

Getting off the Attack Surface Hamster Wheel: Identity Can Help

Published on January 10, 2024

Via HackerNews IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it. The process is simple: begin by thoroughly assessing the attack surface, encompassing the entire IT environment. Identify all…

90+ Key Password Breach Statistics in 2023

Published on December 11, 2023

via Tech Report Password breaches have become common, a worrying trend today. Cybercriminals devise novel means of accessing people’s accounts and records, which many people do not want to encounter. One password should not be used for multiple accounts. Most people now have multiple passwords…

Cybersecurity Awareness Doesn’t Cut It; It’s Time to Focus on Behavior

Published on December 4, 2023

To borrow a line from social scientists, "abundant research shows that people who are simply given more information are unlikely to change their beliefs or behavior." And yet, here we are again, another Cybersecurity Awareness Month: the industry's Hallmark holiday that promotes spending on cybersecurity training videos, phishing simulators,…

Five Cybersecurity Predictions for 2024

Published on November 29, 2023

via Security Week The year 2023 saw heightened cybersecurity activity, with both security professionals and adversaries engaged in a constant cat-and-mouse game. The dynamic landscape of cyber threats and the ever-expanding digital attack surface have compelled organizations to refine and fortify their security architectures. Despite…

Identity Alone Won’t Save Us: The TSA Paradigm and MGM’s Hack

Published on November 14, 2023

via Dark Reading The recent cyberattack against MGM Resorts grabbed headlines and sent shockwaves across the industry. The hotel and entertainment giant struggled to get systems back online after widespread outages affected several of its landmark Las Vegas properties. In addition to outages of internal networks, the…

NSA and CISA reveal top 10 cybersecurity misconfigurations

Published on November 9, 2023

via Bleeping Computer The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. Today's advisory also details what tactics, techniques,…

Are You Willing to Pay the High Cost of Compromised Credentials?

Published on October 3, 2023

via The Hacker News Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of compliance standards. That's because bad actors already have access to billions…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Event
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password