• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Data Security

Five Cybersecurity Predictions for 2024

Published on November 29, 2023

via Security Week The year 2023 saw heightened cybersecurity activity, with both security professionals and adversaries engaged in a constant cat-and-mouse game. The dynamic landscape of cyber threats and the ever-expanding digital attack surface have compelled organizations to refine and fortify their security architectures. Despite…

Identity Alone Won’t Save Us: The TSA Paradigm and MGM’s Hack

Published on November 14, 2023

via Dark Reading The recent cyberattack against MGM Resorts grabbed headlines and sent shockwaves across the industry. The hotel and entertainment giant struggled to get systems back online after widespread outages affected several of its landmark Las Vegas properties. In addition to outages of internal networks, the…

NSA and CISA reveal top 10 cybersecurity misconfigurations

Published on November 9, 2023

via Bleeping Computer The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. Today's advisory also details what tactics, techniques,…

Are You Willing to Pay the High Cost of Compromised Credentials?

Published on October 3, 2023

via The Hacker News Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of compliance standards. That's because bad actors already have access to billions…

NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII

Published on October 2, 2023

via Dark Reading The NFL is workshopping game plays for Super Bowl LVIII — of the cybersecurity sort. Looking to juice up its defense, the league worked with the Cybersecurity and Infrastructure Security Agency (CISA) and Super Bowl LVIII stakeholders during a tabletop exercise that…

Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks

Published on September 25, 2023

via Dark Reading Basic security hygiene is more impactful than you may realize. While industry headlines are often dominated by emerging tech and the latest software or hardware solutions, base-level security hygiene still protects against 98% of attacks. This includes measures such as applying zero-trust principles or keeping…

MGM, Caesars Cyberattack Responses Required Brutal Choices

Published on September 25, 2023

via Dark Reading Twin cyberattacks on MGM Resorts and Caesars Entertainment have provided a singular view into what happens when two similar organizations, under similar attacks by the same threat actor, pursue contrasting incident response strategies.  In this instance, both were victims of a Scattered Spider…

5 Ways CISA Can Help Cyber-Poor Small Businesses & Local Governments

Published on September 8, 2023

via Dark Reading For far too long, the cybersecurity industry has primarily focused on protecting the largest organizations from sophisticated and constantly evolving cyberattacks. While extremely important, this narrow focus has come at the expense of smaller or midsize organizations that don't have the same…

5 Ways CISA Can Help Cyber-Poor Small Businesses & Local Governments

Published on August 23, 2023

via Dark Reading For far too long, the cybersecurity industry has primarily focused on protecting the largest organizations from sophisticated and constantly evolving cyberattacks. While extremely important, this narrow focus has come at the expense of smaller or midsize organizations that don't have the same…

Artificial intelligence threats in identity management

Published on August 3, 2023

via Security Intelligence The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password