• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Category: Mainframes

2013 Was a Year of Big Data Breaches

Published on January 20, 2014

There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…

The Future of the Mainframe

Published on January 2, 2014

For the past two decades, the mainframe has been on a constant deathwatch with IT "experts" and analysts regularly predicting its downfall and extinction. However, the mainframe, both as a style of hardware and as a computing platform, has survived, thrived, and evolved to overcome…

Mainframe Access Management

Published on December 23, 2013

One of the most compelling features of the mainframe is how it allows so many processes to run simultaneously. The mainframe's design allows it to have many users performing a variety of actions day after day without rest. Because mainframes are able to do so…

Protecting Mission Critical Systems Through Data Encryption

Published on December 20, 2013

Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…

Who’s Already Using Encryption?

Published on December 17, 2013

If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…

Password Reset Security Risks

Published on December 3, 2013

For most software and online service accounts, passwords are the main line of defense. However, it is common for many users to have dozens of user accounts for different apps and services. Security requirements dictate that each password have sufficient complexity and be updated periodically.…

From the Mainframe to the Cloud

Published on November 25, 2013

Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…

Renewing Your Company’s Commitment to Security

Published on November 4, 2013

At one point, your company may have made the decision to take security more seriously. It might have been a strategic initiative, or it might have been in response to a past security breach. The CEO might have addressed the company or sent out a…

Making sense of security

Published on October 29, 2013

You and your team may understand the importance of encryption and data security, but that doesn't mean the people who write the checks get it yet. As a mainframe security professional, part of your job is making sense of the challenges of keeping the data…

BYOD in enterprises running mainframes

Published on October 15, 2013

BYOD (Bring Your Own Device) is the increasingly popular and common practice of employees bringing their personal devices to use at work. Many people who own laptops and smart phones are more proficient at using their own devices than their work-issued hardware. People tend to…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password