• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Tag: access management

Identiverse 2025: Your map to navigate the future of identity security

Published on May 30, 2025

via Tom Spring and SC Media Compromised identities now account for one-third of security incidents, and more than 90% of organizations reported multiple identity-related breaches in the last year—an urgent backdrop for what comes next. Enter Identiverse 2025—a four-day deep dive into the technologies, strategies, and…

Warning — 19 Billion Compromised Passwords Have Been Published Online

Published on May 23, 2025

via Davey Winder and Forbes In just the last few months, I have reported on confirmed lists of stolen passwords being made available on the dark web and in criminal forums that have risen from 800 million to 1.7 billion and even as high as 2.1 billion, mainly thanks to the…

Password crisis deepens in 2025: lazy, reused, and stolen

Published on May 15, 2025

via Ernestas Naprys and CyberNews A new study of over 19 billion newly exposed passwords manifests a widespread weak password reuse crisis. Lazy keyboard patterns, such as 123456, still reign supreme, and 94% of passwords are reused or duplicated, data leaks from 2024-2025 reveal. Names like…

The worst passwords you could have in 2025 — or any year

Published on January 2, 2025

via WSAV There are few things as annoying as the sheer amount of passwords we need to log in to everything we use these days. You need bank passwords, email passwords, social media passwords — even passwords for smart fans! — and keeping track of…

Identity management in 2025: 4 ways security teams can address gaps and risks

Published on December 6, 2024

via VentureBeat While 99% of businesses plan to invest more in security, only 52% have fully implemented multi-factor authentication (MFA), and only 41% adhere to the principle of least privilege in access management. Adversaries, including nation-states, state-funded attackers and cybercrime gangs, continue to sharpen their tradecraft using generative AI, machine learning (ML)…

Rapid Growth of Password Reset Attacks Boosts Fraud and Account Takeovers

Published on November 14, 2024

via InfoSecurity Magazine As many as one in four password reset attempts from desktop browsers are fraud, according to security researchers. The fraud attempts are part of a rapid growth in password reset attacks, according to the annual LexisNexis Risk Solutions Cybercrime Report. (LexisNexis Risk Solutions…

15 Encryption Statistics in 2024

Published on June 21, 2024

via Comparitech What is Encryption? Okay, the basics. Encryption involves sending information converted into secret code, known as cryptography. When information is encrypted in computing, the true meaning of the data is hidden until it reaches the recipient, with encrypted text known as ciphertext. Once it reaches the intended…

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

Published on May 1, 2024

via HackerNews More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were found within information stealer logs associated with LummaC2, Raccoon, and RedLine stealer malware. "The number…

Seven Privacy Trends That Can Help Protect Your Business In 2024

Published on April 17, 2024

Via Forbes Data privacy laws in the U.S. have become a complex patchwork of local, state and national regulations. At the beginning of 2023, five states' privacy laws were set to go into effect, and another eight states established privacy laws that went and/or will…

The password attacks of 2023: Lessons learned and next steps

Published on April 12, 2024

Via BleepingComputer It should take more than eight characters to bring a business to a halt. However, the relentless onslaught of password-based cyber attacks underscores the alarming ease with which cybercriminals can exploit vulnerable credentials to inflict damage. Password attacks take many forms: from phishing…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Event
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password