The security risks facing Adabas data are higher than ever because your mainframe is more exposed. More tools and applications are accessing and manipulating data for analysis, intelligence and real-time processing. Enterprise systems are also more interconnected, with distributed networks and the internet used for daily operations.
How will you prevent malicious access before it damages your operations or causes customers to lose confidence? Do you have full visibility into your database activity to detect unauthorized use, especially when more than half of database breaches come from insiders? Are you able to respond to security audits and compliance mandates?
In this environment, you need enhanced features of Adabas and the IBM Z® platform to protect your sensitive data wherever it is and however it is used.
In an environment with increasing malicious attacks from external and internal sources and greater connectivity of your Adabas systems, you need comprehensive database security. Protecting sensitive data goes beyond compliance—it means maintaining customer trust and a competitive edge.
It’s time to take a fresh look at cybersecurity to protect your data at rest, in use and in flight. Embrace industry-leading encryption to reduce the risks and costs of a data breach and help meet complex compliance mandates. Authenticate users to prevent unauthorized access, and audit to gain full visibility into database activity to inhibit in-house fraud and protect your company and employees. Together, these solutions can keep your Adabas systems secure and reliable for years to come.
Encrypt your Adabas data with industry-leading security. Streamline administration with easy-to-use enterprise key management, which helps you protect your information against unauthorized access.
Adabas Encryption for z/OS extends the security and reliability benefits of IBM hardware-based pervasive encryption to Adabas data sets. IBM Z offers high-speed encryption and key management for broad protection with fast database performance. You can choose to apply selective encryption or encrypt your fullAdabas data sets.
Adabas Encryption provides greater security than disk-level encryption that onlyprotects against theft of physical media. Encryption requires no changes to yourapplications—continue to deliver data to all your authorized programs, users and services.
Extensive use of encryption is one of the most impactful ways to help reduce the risks and financial losses of a databreach and help meet complex compliance mandates.
Adabas authentication and authorization enable you to deliver uninterrupted data to authorized programs, users and services. All Adabas utilities can work with encrypted data without requiring changes. Management is simplified through existing utilities for loading, unloading, restoring, backup and other functions.
Adabas SAF Security ensures your data is secured with proven, industry-standard security methods. By using profiles and connecting directly with the IBM ResourceAccess Control Facility (RACF), CA-ACF2® or CA-Top Secret® for data privacy, you can feel confident these resource managers grant access only to authorized users.
Protect your data at its most vulnerable point—on public networks between the application and your Adabas database. Adabas solutions encrypt data before it is sent over the network and decrypt it upon return, making the process transparent to the application.
You can implement encryption to protect data in flight without changing your existing applications. Entire Net-Work encryption leverages security negotiations and encryption of industry-standard security transport protocols, such as TCP/IP and AT-TLS, to protect your data as it travels on private and public networks, including the internet, between Adabas and any application.
To detect unauthorized access, you need a cybersecurity solution that delivers full visibility into your database activity: who is reading or changing your data, the changes made, when and where the activity occurred and which applications were used to access your data.
Enhance your cybersecurity with a powerful, easy-to-use web-based tool that helps your organization protect data and comply with ever-growing regulations. Then, track and store audit data safely in secure, indexed, long-term archives so your data stays protected and is available whenever you need to review it. With Adabas Auditing for z/OS you can:
- Empower auditors/security officers to certify that IT systems follow quality standards and regulations
- Enable database administrators to track all access and activity on the database
- Support data protection officers with tools to respond quickly to security audits