• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

News

Tips for Securing Business Data

Published on June 5, 2024

via NewsWatch When you’re running a business, security should be at the top of the list of concerns. You already know that security of the physical structure of your building is a must if you run a brick-and-mortar store. However, it also has to do…

Cyber Survival Guide: Prepare for the Most Disruptive Threats of 2024

Published on May 31, 2024

via Gallagher UK lawmakers have called on the government to take effective action to tackle cyber-attacks, which have not only become a threat to organizations worldwide, but also to national security. Cybercrime is now part of everyday life and with attacks also becoming more widespread…

America’s Password Habits: 46% Report Having their Password Stolen Over the Last Year

Published on May 22, 2024

via Forbes In a study commissioned by Forbes Advisor, an alarming 46% of Americans admit to having their password stolen in the past year. This survey, conducted by OnePoll, reflects the urgent need for improved password practices among U.S. users, such as using a password manager.…

6 lessons to learn from the 60-year history of the modern mainframe

Published on May 17, 2024

via CIO As we celebrate the mainframe’s rich history, there’s a lot we can still learn from this technological marvel. Here are six lessons the modern mainframe has taught us over its last 60 years. CREDIT: ISTOCK/MIKHAIL KONOPLEV The mainframe has long stood as a…

Digital safety is at a crossroads – here’s how we navigate online threats globally

Published on May 17, 2024

via World Economic Forum A recent survey conducted by Microsoft has brought to light a disturbing revelation: a staggering 69% of the 16,000 respondents across 16 countries encountered online risks within the past year. This alarming statistic underscores the pervasive nature of digital threats, including misinformation, disinformation,…

How to create a password that’s safe from hackers in 2024

Published on May 6, 2024

via This Is Money It can take less than six hours to hack 90 per cent of passwords, leaving your online identity, personal data, and bank accounts clicks away from any hacker worth their salt. Gone are the halcyon days of choosing passwords such as…

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

Published on May 1, 2024

via HackerNews More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were found within information stealer logs associated with LummaC2, Raccoon, and RedLine stealer malware. "The number…

Data Encryption In-Depth Guide in 2024

Published on April 26, 2024

Via AIMultiple Digital information is constantly being shared and stored on cloud and connected services. According to IBM, the average cost for a data breach involving 50 million to 65 million records is more than $400 million.1 Protecting sensitive data is the backbone of cybersecurity, and encryption has…

Seven Privacy Trends That Can Help Protect Your Business In 2024

Published on April 17, 2024

Via Forbes Data privacy laws in the U.S. have become a complex patchwork of local, state and national regulations. At the beginning of 2023, five states' privacy laws were set to go into effect, and another eight states established privacy laws that went and/or will…

The password attacks of 2023: Lessons learned and next steps

Published on April 12, 2024

Via BleepingComputer It should take more than eight characters to bring a business to a halt. However, the relentless onslaught of password-based cyber attacks underscores the alarming ease with which cybercriminals can exploit vulnerable credentials to inflict damage. Password attacks take many forms: from phishing…

Previous 1 2 3 4 5 … 30 Next

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password