Software AG no longer operates as a stock corporation, but as Software GmbH (company with limited liability). Despite the change of name, we continue to offer our goods and services under the registered trademarks .
Read More
Software AG logo linking to home page
  • Products
    Back
    What do you want to do today?
    Alt Text for Icon
    Enterprise Applications
    Use Adabas & Natural to build and deploy high-performance applications on IBM Z®, Linux or cloud while connecting seamlessly to the latest innovations.
    Alt Text for Icon
    Looking for something else?
    We will work with you to help you solve your next digital transformation challenge. Let’s talk!
    Alt Text for Icon
    Data Virtualization & Movement
    Use CONNX to easily access, virtualize and move your data—wherever it is, however it’s structured—to power new apps, analytics, AI and hybrid cloud.
    What makes us different
    One partner, unlimited potential
    In this multi-cloud, ecosystem-driven world, you can't afford to work with one-hit wonders. See where we rank across categories in Gartner Magic Quadrant reports.
  • Resources
    Back
    Explore
    Blog icon
    Blog
    What's new and noteworthy in digital transformation
    Dev Center
    Developer Center
    A one-stop-shop for developer resources
    Communities
    Communities
    Connect and collaborate with your peers
    Upcoming Webinars & Events
    Upcoming Webinars & Events
    Expert guidance on tech trends and tactics
    Education & Training
    Education & Training
    Learn and get certified on our products
    News Center
    News Center
    The latest news and media resources
    Learn
    Resource library
    Customer stories
    On-demand webinars
    Free trials
    Articles
    Demos
    Datasheets
    Videos
    White papers
    Hot off the press
    Compare vendors in the 2024 Gartner® Magic Quadrant™ for Industrial IoT Platforms
    Read the report
  • Customers
    Back
    Customer stories icon
    Customer Stories
    Services icon
    Services
    Support icon
    Support
    Education & Training icon
    Education & Training
    Trust Portal icon
    Trust Portal
    Community icon
    Community
    Support portal icon
    Support Portal
    Featured
    Read real stories of digital transformation from real customers.
    Read all customer stories
    Get the most from your product through an intensive engagement with our team of services experts.
    See our Fast Track services
  • Developers
    Back
    Dev Center icon
    Developer Center
    Tech Community icon
    Tech Community
    User Groups icon
    User Groups
    Dev Center icon
    Documentation & Learning
    Dev Center icon
    Free Trials
    Featured
    Collaborate (and connect!) with your peers. Ask and answer questions in our Tech Community.
    Visit Tech Community
    Get everything you need to get the most out of your products, all in one place.
    Access the Developer Center
Selecting a region changes the language and/or content of this page.
  • International (English)
  • Brasil | Portuguese
  • France | French
  • Deutschland | German
  • 日本語 | Japanese
  • 대한민국 | Korean
  • España | Spanish
Schedule a demo
Contact us
eBook

Maximize the security of your Adabas data

Learn how encryption, access control and auditing can deliver pervasive security and a complete view of Adabas system activity

  • Changing threats call for a new approach to security
  • Protect and monitor your most valuable data
  • Encrypt to protect data at rest
  • Control access to protect data in use
  • Secure communications to protect data in flight
  • Detect unauthorized access with complete auditability
  • Upgrade your security with IBM z15 and z16
Changing threats call for a new approach to security

The security risks facing Adabas data are higher than ever because your mainframe is more exposed. More tools and applications are accessing and manipulating data for analysis, intelligence and real-time processing. Enterprise systems are also more interconnected, with distributed networks and the internet used for daily operations.

How will you prevent malicious access before it damages your operations or causes customers to lose confidence? Do you have full visibility into your database activity to detect unauthorized use, especially when more than half of database breaches come from insiders? Are you able to respond to security audits and compliance mandates?

In this environment, you need enhanced features of Adabas and the IBM Z® platform to protect your sensitive data wherever it is and however it is used.

1. Verizon Insider Threats Report
2. IBM 2022 Cost of a Data Breach Report
Protect and monitor your most valuable data

In an environment with increasing malicious attacks from external and internal sources and greater connectivity of your Adabas systems, you need comprehensive database security. Protecting sensitive data goes beyond compliance—it means maintaining customer trust and a competitive edge. 

It’s time to take a fresh look at cybersecurity to protect your data at rest, in use and in flight. Embrace industry-leading encryption to reduce the risks and costs of a data breach and help meet complex compliance mandates. Authenticate users to prevent unauthorized access, and audit to gain full visibility into database activity to inhibit in-house fraud and protect your company and employees. Together, these solutions can keep your Adabas systems secure and reliable for years to come.

Protect data at rest with industry-leading encryption.
Protect data in use with control over user profiles and access.
Protect data in flight with secure, encrypted communication.
Audit all database activity to detect unauthorized access.
Encrypt to protect data at rest

Encrypt your Adabas data with industry-leading security. Streamline administration with easy-to-use enterprise key management, which helps you protect your information against unauthorized access.

Adabas Encryption for z/OS extends the security and reliability benefits of IBM hardware-based pervasive encryption to Adabas data sets. IBM Z offers high-speed encryption and key management for broad protection with fast database performance. You can choose to apply selective encryption or encrypt your fullAdabas data sets.

Adabas Encryption provides greater security than disk-level encryption that onlyprotects against theft of physical media. Encryption requires no changes to yourapplications—continue to deliver data to all your authorized programs, users and services.

Extensive use of encryption is one of the most impactful ways to help reduce the risks and financial losses of a databreach and help meet complex compliance mandates.

- Michael Jordan, IBM Distinguished Engineer for Z Security
Control access to protect data in use

Adabas authentication and authorization enable you to deliver uninterrupted data to authorized programs, users and services. All Adabas utilities can work with encrypted data without requiring changes. Management is simplified through existing utilities for loading, unloading, restoring, backup and other functions.

Adabas SAF Security ensures your data is secured with proven, industry-standard security methods. By using profiles and connecting directly with the IBM ResourceAccess Control Facility (RACF), CA-ACF2® or CA-Top Secret® for data privacy, you can feel confident these resource managers grant access only to authorized users.

 

1. IBM 2020 Cost of a Data Breach Report
Secure communications to protect data in flight

Protect your data at its most vulnerable point—on public networks between the application and your Adabas database. Adabas solutions encrypt data before it is sent over the network and decrypt it upon return, making the process transparent to the application.

You can implement encryption to protect data in flight without changing your existing applications. Entire Net-Work encryption leverages security negotiations and encryption of industry-standard security transport protocols, such as TCP/IP and AT-TLS, to protect your data as it travels on private and public networks, including the internet, between Adabas and any application.

Detect unauthorized access with complete auditability

To detect unauthorized access, you need a cybersecurity solution that delivers full visibility into your database activity: who is reading or changing your data, the changes made, when and where the activity occurred and which applications were used to access your data.

Enhance your cybersecurity with a powerful, easy-to-use web-based tool that helps your organization protect data and comply with ever-growing regulations. Then, track and store audit data safely in secure, indexed, long-term archives so your data stays protected and is available whenever you need to review it. With Adabas Auditing for z/OS you can:

  • Empower auditors/security officers to certify that IT systems follow quality standards and regulations
  • Enable database administrators to track all access and activity on the database
  • Support data protection officers with tools to respond quickly to security audits
Upgrade your security with IBM z15 and z16
IBM Z pervasive encryption provides an umbrella of functionality to the IBM Z platform to meet complex compliance mandates while reducing the risks and financial losses of a data breach. IBM Pervasive Encryption and Adabas security solutions operate on the latest three versions of IBM Z. With IBM's data encryption everywhere, you can protect your data on-prem or in flight—running up to 19 billion fully encrypted transactions per day—and manage privacy by policy. The IBM Z platform enables increased speed, scalability, security and the high availability demanded by today’s enterprises.
Learn more about the IBM Z
Explore IBM Pervasive Encryption
You may also like:
Stay connected
Join the community and follow the latest news about Adabas & Natural in the Software AG Tech Community.
Visit our Tech Community
See what's new
Discover the latest innovations, view webinars and see how Adabas & Natural is ready for 2050 and beyond.
Learn more
International User Groups
Join one of our User Groups to network with your peers from all around the globe.
Learn more
Want to make your core applications future ready?
Build on your legacy. Accelerate development in a modern DevOps environment. Modernize your Adabas & Natural applications to save costs and embrace hybrid cloud. 
Speak with an expert
Try for free
Ask for a free IT Health Check
Software AG

  • Analysts
  • Developers
  • Investors
  • Press
  • Government
  • Job seekers
  • About Software AG
  • Services
  • Training
  • Resource Library
  • Blog
  • Trust Portal
  • Research
  • Sustainability/ESG
  • Industry awards
  • Contact us
  • Get support
  • Join a community
  • Attend an event
  • Subscribe to updates
  • Connect with user groups
  • Reporting System

Reality Check 2024: A new wave of Technology Chaos

A Chaos of Connectivity Is Putting Businesses at Risk

Reality Check - risk born of rapid tech expansion

The name Software AG and all Software AG product names are either trademarks or registered trademarks of Software AG and/or its subsidiaries and/or its affiliates and/or their licensors. Other company and product names mentioned herein may be trademarks of their respective owners.
  • © 2020-2025 Software GmbH
  • Social Responsibility
  • Terms Of Use
  • Imprint
  • Privacy
  • Responsible Disclosure Policy
  • Cookie preferences
  • LinkedIn
  • Facebook
  • Twitter
  • YouTube
  • TechCommunity
ICS JPG PDF WRD XLS