{"id":682,"date":"2023-04-05T15:21:11","date_gmt":"2023-04-05T19:21:11","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas_natural_encryption-zos\/"},"modified":"2025-12-20T18:51:22","modified_gmt":"2025-12-20T22:51:22","slug":"adabas-natural-encryption-zos","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","title":{"rendered":"Adabas Encryption para z\/OS\u00ae"},"content":{"rendered":"<p>O Adabas Encryption para z\/OS ajuda voc\u00ea a proteger seus dados e a manter conformidade total com regulamenta\u00e7\u00f5es de seguran\u00e7a em constante evolu\u00e7\u00e3o. Criptografe todo o seu banco de dados ou arquivos espec\u00edficos usando os recursos avan\u00e7ados e seguros da criptografia nativa e baseada em hardware do <a href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/ibm-z-mainframe\/\">IBM zSystems<sup>TM<\/sup><\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-maintain-database-performance\">Aplique seguran\u00e7a de ponta e mantenha o desempenho do banco de dados<\/h2>\n\n\n\n<p>H\u00e1 d\u00e9cadas que as organiza\u00e7\u00f5es que executam <a href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/\">Adabas<\/a> no IBM z\/OS geram uma quantidade imensa de informa\u00e7\u00f5es valiosas, incluindo dados financeiros, informa\u00e7\u00f5es pessoais e material de neg\u00f3cios protegido por direitos autorais. Demandas regulat\u00f3rias crescentes, combinadas \u00e0 necessidade de medidas de ciberseguran\u00e7a cada vez mais fortes, tornam essencial para as organiza\u00e7\u00f5es proteger suas informa\u00e7\u00f5es contra acesso n\u00e3o autorizado. O IBM zSystems oferece fun\u00e7\u00f5es de criptografia segura e de alto desempenho para habilitar seguran\u00e7a de ponta para os dados. O Adabas Encryption para z\/OS utiliza esses servi\u00e7os criptogr\u00e1ficos em uma ferramenta f\u00e1cil de usar que ajuda as organiza\u00e7\u00f5es a proteger bancos de dados inteiros ou arquivos espec\u00edficos em um processo otimizado. Agora voc\u00ea pode administrar bancos de dados de alto desempenho enquanto aprimora a seguran\u00e7a e mant\u00e9m a conformidade com uma crescente lista de regulamenta\u00e7\u00f5es, como HIPAA, SOX, PCI DSS, GDPR e LGPD. Usar o Adabas Encryption para z\/OS simultaneamente com o Adabas SAF Security protege e criptografa seus dados em repouso. Usado em conjunto com o Entire Net-Work, voc\u00ea tamb\u00e9m pode proteger seus dados em tr\u00e2nsito. Juntas, essas ferramentas ajudam a manter seus sistemas Adabas seguros e confi\u00e1veis por muitos anos, sem exigir modifica\u00e7\u00f5es em suas aplica\u00e7\u00f5es.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-complete-protection\">Prote\u00e7\u00e3o completa<\/h3>\n\n\n\n<p class=\"translation-block\">Para proteger e criptografar seus dados em repouso, o Adabas Encryption para z\/OS \u00e9 o parceiro perfeito do Adabas SAF Security. O Adabas SAF Security garante que seus dados sejam protegidos por m\u00e9todos de seguran\u00e7a comprovados, padr\u00e3o de mercado, usados pela maioria dos sistemas IBM z\/OS e sites compat\u00edveis. Voc\u00ea pode controlar recursos do sistema utilizando perfis e conectando-se diretamente a ferramentas de seguran\u00e7a externas como: IBM RACF<sup>\u00ae<\/sup>, CA-ACF2<sup>\u00ae<\/sup> ou CA-Top Secret<sup>\u00ae<\/sup>. Esse sistema \u00fanico de controle e auditoria para todos os seus recursos minimiza esfor\u00e7os administrativos para que voc\u00ea se concentre nas tarefas mais importantes. Depois de proteger seus dados, criptografe todos os seus arquivos Adabas usando o Adabas Encryption para z\/OS.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-benefits\">Principais benef\u00edcios<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conformidade com regulamenta\u00e7\u00f5es de prote\u00e7\u00e3o de dados em constante evolu\u00e7\u00e3o, de forma eficiente e completa<\/li>\n\n\n\n<li>Prote\u00e7\u00e3o para seus dados contra o acesso de agentes n\u00e3o autorizados<\/li>\n\n\n\n<li>Benef\u00edcios de seguran\u00e7a e confiabilidade da criptografia baseada em hardware e do gerenciamento de chaves na plataforma IBM zSystems<\/li>\n\n\n\n<li>Desempenho \u00e1gil do banco de dados com criptografia seletiva de dados<\/li>\n\n\n\n<li>Solu\u00e7\u00e3o de uso imediato com suporte do fornecedor<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1930\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-encryption-z-os-graphic-01.svg\" alt=\"\" class=\"wp-image-679\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-capabilities\">Principais capacidades<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-customize-encryption\">Personalize a criptografia<\/h4>\n\n\n\n<p>Escolha o alcance de criptografia mais adequado \u00e0s suas necessidades: criptografar todo o banco de dados ou apenas arquivos espec\u00edficos.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-performance-with-targeted-security\">Preserve o desempenho com seguran\u00e7a direcionada<\/h4>\n\n\n\n<p>Criptografe apenas os dados necess\u00e1rios para otimizar o processo e reduzir o uso de CPU.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Simplifique o gerenciamento de chaves corporativas<\/h4>\n\n\n\n<p>Otimize as mudan\u00e7as peri\u00f3dicas de chaves de criptografia usando o sistema de gerenciamento seguro da IBM para chaves e certificados.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Preserve o acesso para utilit\u00e1rios autorizados<\/h4>\n\n\n\n<p>Forne\u00e7a dados de forma ininterrupta a programas, usu\u00e1rios e servi\u00e7os autorizados. Todos os utilit\u00e1rios Adabas podem funcionar com dados criptografados sem exigir modifica\u00e7\u00f5es.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-management\">Simplifique o gerenciamento<\/h4>\n\n\n\n<p>Gerencie seu banco de dados com os utilit\u00e1rios existentes para carregar, descarregar, restaurar, criar backups de dados e outras fun\u00e7\u00f5es.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-support-your-ibm-ziip-investment\">Suporte ao seu investimento no IBM zIIP\u2122<\/h4>\n\n\n\n<p>O Adabas Encryption para z\/OS \u00e9 totalmente funcional e compat\u00edvel para clientes que descarregam cargas de trabalho para processadores zIIP.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-it-works\">Como funciona<\/h3>\n\n\n\n<p>O IBM zSystems oferece \u00e0 sua organiza\u00e7\u00e3o uma variedade de recursos alavancada pelo Adabas Encryption para z\/OS, incluindo criptografia baseada em hardware e fun\u00e7\u00f5es para gerenciar acesso e chaves corporativas. O primeiro passo para uma solu\u00e7\u00e3o abrangente de criptografia de dados corporativos \u00e9 configurar seu zSystems para os servi\u00e7os de criptografia.<\/p>\n\n\n\n<p>Os modelos recentes da IBM possuem um elemento de software chamado Integrated Cryptographic Service Facility (ICSF), que funciona com o hardware existente para fornecer recursos, como:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resource Access Control Facility (RACF): oferece suporte \u00e0 privacidade de dados ao tomar decis\u00f5es de controle de acesso por meio de gerenciadores de recursos, com acesso concedido apenas a usu\u00e1rios autorizados.<\/li>\n\n\n\n<li>IBM Enterprise Key Management Foundation (EKMF): \u00e9 um sistema de gerenciamento de chaves altamente seguro que fornece um servi\u00e7o centralizado para uma gest\u00e3o eficiente e segura de chaves e certificados.<\/li>\n\n\n\n<li>Central Processor Assist para Cryptographic Function (CPACF): oferece melhorias de desempenho na acelera\u00e7\u00e3o de hardware, tornando o suporte \u00e0 criptografia pervasiva (pervasive encryption) mais econ\u00f4mico.<\/li>\n<\/ul>\n\n\n\n<p>Com seu IBM zSystems configurado, voc\u00ea est\u00e1 pronto para come\u00e7ar a usar o Adabas Encryption para z\/OS, para proteger seus dados e manter a conformidade regulat\u00f3ria.<\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-take-the-next-step\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Recursos recomendados<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"\u00edcone de l\u00e2mpada\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Mantenha-se conectado<\/h4>\n\n\n\n<p class=\"translation-block\">Fa\u00e7a parte da comunidade e acompanhe as \u00faltimas not\u00edcias sobre Adabas &amp; Natural na TechCommunity da <span class=\"nowrap\">Software AG<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Visite a Tech Community<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"\u00edcone do laptop\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Conhe\u00e7a as novidades<\/h4>\n\n\n\n<p class=\"translation-block\">Descubra as \u00faltimas inova\u00e7\u00f5es, assista \u00e0 webinars e veja como o <span class=\"nowrap\">Adabas &amp; Natural<\/span> est\u00e3o prontos para 2050 e al\u00e9m.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/\">Saiba mais<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"\u00edcone do globo\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Grupos de Usu\u00e1rios<\/h4>\n\n\n\n<p>Participe de um dos nossos Grupos de Usu\u00e1rios para se conectar com colegas de todo o mundo.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/developer\/usergroup\/\">Saiba mais<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-c2f60aabc78c1f9ec73b811d629a3db1\" id=\"h-see-decide-amp-act-with-software-ag\">Quer tornar as suas aplica\u00e7\u00f5es de miss\u00e3o cr\u00edtica prontas para o futuro?<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-f681796f63d5098c350294242f01a703\">Construa com base no seu legado. Acelere o desenvolvimento em um ambiente DevOps moderno. Modernize suas aplica\u00e7\u00f5es Adabas &amp; Natural para economizar custos e adotar a nuvem h\u00edbrida.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fale com um especialista<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Proteja seus dados e mantenha-se totalmente em conformidade com as crescentes normas de seguran\u00e7a. Criptografe todo o seu banco de dados ou arquivos espec\u00edficos, usando os recursos avan\u00e7ados e seguros de criptografia do IBM Z.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[72,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-682","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-mainframe","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for z\/OS: Protect Your Sensitive Data | Software AG<\/title>\n<meta name=\"description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta property=\"og:description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"name\":\"Encryption for z\/OS: Protect Your Sensitive Data | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-04-05T19:21:11+00:00\",\"dateModified\":\"2025-12-20T22:51:22+00:00\",\"description\":\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for z\/OS\u00ae\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_locale":"pt_BR","og_type":"article","og_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","og_description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","og_url":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:51:22+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","name":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-04-05T19:21:11+00:00","dateModified":"2025-12-20T22:51:22+00:00","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for z\/OS\u00ae"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Solu\u00e7\u00f5es e servi\u00e7os de transforma\u00e7\u00e3o digital da Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/682\/revisions"}],"predecessor-version":[{"id":4390,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/682\/revisions\/4390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media?parent=682"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/product?post=682"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-industry?post=682"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-topic?post=682"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-type?post=682"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-subdirectory?post=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}