The Hidden Costs of Moving from the Mainframe
Published on March 20, 2014
Distributed computing came with the promise of many opportunities for cost savings. Companies expected to save money when they move their applications from a centralized mainframe to a distributed environment or cloud solution. However, it's not all sunshine and roses. Many hidden costs inflate the…
Employees and BYOD Security
Published on March 14, 2014
If your organization has a BYOD (Bring Your Own Device) policy, there's a couple more things you'll need: Education for your employees and security on the software side. We've spoken before about some of the technological and policy issues of BYOD for enterprises running mainframes.…
Mainframes Make the Extraordinary Possible
Published on March 3, 2014
No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for…
What Will Matter in Access Management Software in 2014
Published on February 20, 2014
Mobile and cloud computing will continue to increase the importance of a secure access management system. This means access control will have to become an even larger part of any organization's data security strategy. Companies with deep technical talent may be tempted to develop and…
The Mainframe Turns 50
Published on February 12, 2014
2014 is a big year for tech anniversaries. There was a big celebration for the 30th anniversary of the Mac, which changed personal computing forever and the way people felt about their computers. There was also the 10th anniversary of Facebook, which changed the way…
Common Misconceptions About Multi-Factor Authentication
Published on February 5, 2014
Although multi-factor authentication has been repeatedly proven to be a more secure way to protect user accounts from hackers, many common misconceptions still prevail about what counts as strong multi-factor authentication. Some account security measures that by themselves are weak multi-factor authentication, at best, include:…
Latest Enhancements Position MegaCryption as Best-In-Class Encryption Software for Big Data
Published on February 5, 2014
Naples, FL—January 2014 Advanced Software Products Group’s (ASPG) latest announced enhancements to MegaCryption simultaneously offer increased protection and increased ease of use to creators and consumers of Big Data. The enhancements include increased centralization of cryptographic key portability and interoperability, as well as increased support…
ReACT Self-Service Password Reset Software Extends User Reach
Published on January 30, 2014
Naples, FL—January 2014 Advanced Software Products Group (ASPG) has announced changes to ReACT, its enterprise-grade self-service password reset software, that further extend the reach and usability of the system for both end users and administrators alike. The changes enhance ReACT accessibility across all operating systems…
Physical Security for Mainframes
Published on January 29, 2014
On this blog, we've discussed many of the important elements of data security, including encryption, access controls, multi-factor authentication, password management, and many others. However, no data security strategy is complete without physical control over the hardware. A comprehensive data security system requires physical control…
ReACT Password Reset Software for Enterprise Now Offers Highest Possible Security
Published on January 28, 2014
Naples, FL—January 2014 Advanced Software Products Group (ASPG) has announced changes to ReACT, its enterprise-grade self-service password reset software, that now provide the highest possible levels of password reset security through its use of multi-factor authentication (“MFA”). ReACT, a self-service password reset and synchronization software…