{"id":688,"date":"2023-07-25T10:36:49","date_gmt":"2023-07-25T14:36:49","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"},"modified":"2025-12-20T18:36:46","modified_gmt":"2025-12-20T22:36:46","slug":"adabas-encryption-linux","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-encryption-linux\/","title":{"rendered":"Adabas Encryption para Linux"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-on-premises-and-in-the-cloud\">Aplique seguran\u00e7a de ponta no local e na nuvem<\/h2>\n\n\n\n<p>Crescentes demandas regulat\u00f3rias, combinadas com a necessidade de medidas de ciberseguran\u00e7a cada vez mais fortes, tornam a prote\u00e7\u00e3o de suas valiosas informa\u00e7\u00f5es contra acessos n\u00e3o autorizados algo cr\u00edtico para a sua organiza\u00e7\u00e3o. O Adabas Encryption para Linux ajuda voc\u00ea a proteger os seus dados e ficar em total conformidade com crescentes regulamenta\u00e7\u00f5es de seguran\u00e7a. Proteja dados em repouso ou em tr\u00e2nsito com criptografia de ponta que funciona onde quer que seu sistema esteja implantado. Com o Adabas Encryption para Linux, voc\u00ea pode executar suas aplica\u00e7\u00f5es virtualmente e protejer seus dados Adabas em qualquer lugar. Aproveite a escalabilidade e a capacidade de resposta de m\u00e1quinas virtuais e cont\u00eaineres, e rode no seu fornecedor de nuvem de prefer\u00eancia. enquanto proteje seus dados com os mais altos padr\u00f5es de criptografia.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-complete-protection\">Prote\u00e7\u00e3o completa<\/h2>\n\n\n\n<p>Rodando em Linux, voc\u00ea pode proteger seus dados <a href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/\">Adabas<\/a> em repouso, em tr\u00e2nsito e em uso, sem necesidade de qualquer altera\u00e7\u00e3o na aplica\u00e7\u00e3o e sem arriscar o seu desempenho confi\u00e1vel. O Adabas Encryption para Linux protege dados em tr\u00e2nsito com acesso TCP\/IP direto ao seu n\u00facleo Adabas, baseado em OpenSSL e TSL. Ele tamb\u00e9m protege dados sens\u00edveis em repouso com uma solu\u00e7\u00e3o baseada em software que suporta o AES (Advanced Encryption Standards) do NIST no n\u00edvel do banco de dados. Isto garante que, mesmo que o cont\u00eainer de armazenamento de seus dados Adabas seja copiado por usu\u00e1rios n\u00e3o autorizados, seus dados permanecer\u00e3o criptografados e protegidos. Com o controle de acesso baseado em fun\u00e7\u00f5es encontrado no Adabas para Linux, voc\u00ea tamb\u00e9m pode proteger seus dados em uso, controlando perfis de usu\u00e1rios e permiss\u00f5es de acesso. O Adabas Encryption inclui um keystore integrado e pronto para uso que fornece facilidade de administra\u00e7\u00e3o de criptografia e chaves de acesso, ao mesmo tempo em que permite o arquivamento seguro de dados a longo prazo.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-benefits\">Principais benef\u00edcios<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conformidade com regulamenta\u00e7\u00f5es de prote\u00e7\u00e3o de dados em constante evolu\u00e7\u00e3o, de forma eficiente e completa<\/li>\n\n\n\n<li>Prote\u00e7\u00e3o para seus dados contra o acesso de agentes n\u00e3o autorizados<\/li>\n\n\n\n<li>Criptografia avan\u00e7ada com chaves padr\u00e3o AES de 128 e 256 bits<\/li>\n\n\n\n<li>Gest\u00e3o facilitada de criptografia e chaves de acesso para administra\u00e7\u00e3o<\/li>\n\n\n\n<li>Prote\u00e7\u00e3o dos dados em repouso e em tr\u00e2nsito, sem altera\u00e7\u00f5es em suas aplica\u00e7\u00f5es existentes<\/li>\n\n\n\n<li>Prote\u00e7\u00e3o customizada, com criptografia apenas dos bancos de dados selecionados<\/li>\n\n\n\n<li>Solu\u00e7\u00e3o pronta para uso, suportada pelo fornecedor, que n\u00e3o requer novas instala\u00e7\u00f5es<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/softwareag.scene7.com\/is\/image\/softwareagprod\/ds-adabas-encryption-for-linux-graphic-1?$PNGwithAlpha$&amp;wid=1260&amp;dpr=off\" alt=\"\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-features\">Capacidades t\u00e9cnicas<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-encrypt-on-linux-everywhere\">Criptografia no Linux, em qualquer lugar<\/h5>\n\n\n\n<p>Aplica\u00e7\u00e3o da mesma solu\u00e7\u00e3o de criptografia avan\u00e7ada para m\u00e1quinas virtuais e cont\u00eaineres, rodando on-premises ou na nuvem.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Simplifique o gerenciamento de chaves corporativas<\/h5>\n\n\n\n<p>Simplifica\u00e7\u00e3o da administra\u00e7\u00e3o da criptografia para gerar, armazenar e gerenciar chaves com um keystore no sistema de gerenciamento de arquivos.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Preserve o acesso para utilit\u00e1rios autorizados<\/h5>\n\n\n\n<p>Forne\u00e7a dados de forma ininterrupta a programas, usu\u00e1rios e servi\u00e7os autorizados. Todos os utilit\u00e1rios Adabas podem funcionar com dados criptografados sem exigir modifica\u00e7\u00f5es.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-modernize-securely\">Moderniza\u00e7\u00e3o segura<\/h5>\n\n\n\n<p>Voc\u00ea escolhe a implanta\u00e7\u00e3o Linux que atende suas necessidades, e altera a infraestrutura de TI sem comprometer a seguran\u00e7a.<br><\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-you-may-also-like\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Recursos recomendados<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"\u00edcone de l\u00e2mpada\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Mantenha-se conectado<\/h4>\n\n\n\n<p class=\"translation-block\">Fa\u00e7a parte da comunidade e acompanhe as \u00faltimas not\u00edcias sobre Adabas &amp; Natural na TechCommunity da <span class=\"nowrap\">Software AG<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Visite a Tech Community<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"\u00edcone do laptop\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Conhe\u00e7a as novidades<\/h4>\n\n\n\n<p class=\"translation-block\">Descubra as \u00faltimas inova\u00e7\u00f5es, assista \u00e0 webinars e veja como o <span class=\"nowrap\">Adabas &amp; Natural<\/span> est\u00e3o prontos para 2050 e al\u00e9m.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/\">Saiba mais<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"\u00edcone do globo\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Grupos de Usu\u00e1rios<\/h4>\n\n\n\n<p>Participe de um dos nossos Grupos de Usu\u00e1rios para se conectar com colegas de todo o mundo.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/developer\/usergroup\/\">Participe<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-b8d6f6f931fae20ac61d525c023df76b\" id=\"h-want-to-make-your-core-applications-future-ready\">Quer tornar as suas aplica\u00e7\u00f5es de miss\u00e3o cr\u00edtica prontas para o futuro?<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e04203c2fbc13876bd23d5f3081c4d1d translation-block\">Construa sob o seu legado. Acelere o desenvolvimento em um ambiente DevOps moderno. Modernize suas aplica\u00e7\u00f5es Adabas &amp; Natural para reduzir custos e adotar a nuvem h\u00edbrida.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/contact\/\">Fale com um especialista<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-dark-bg-transparent is-style-dark-bg-transparent--5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/t\/adabas-natural-community-edition-for-docker-download\/235228\">Teste gratuito<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignwide is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--6\"><a class=\"wp-block-button__link has-white-color has-text-color has-link-color has-text-align-left wp-element-button\" href=\"https:\/\/discover.softwareag.com\/free-it-health-checks.html\">Solicite uma avalia\u00e7\u00e3o gratuita do estado da sua TI<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Execute seus aplicativos confi\u00e1veis em praticamente qualquer lugar e proteja seus dados Adabas em qualquer lugar com a prote\u00e7\u00e3o completa fornecida pelo Adabas Encryption for Linux.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[76,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-688","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-linux-cloud","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for Linux: Protect Your Data Today | Software AG<\/title>\n<meta name=\"description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta property=\"og:description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"name\":\"Encryption for Linux: Protect Your Data Today | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-07-25T14:36:49+00:00\",\"dateModified\":\"2025-12-20T22:36:46+00:00\",\"description\":\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for Linux: Protect Your Data Today | Software AG","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-encryption-linux\/","og_locale":"pt_BR","og_type":"article","og_title":"Adabas Encryption for Linux","og_description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","og_url":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-encryption-linux\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:36:46+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for Linux","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","name":"Encryption for Linux: Protect Your Data Today | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-07-25T14:36:49+00:00","dateModified":"2025-12-20T22:36:46+00:00","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Solu\u00e7\u00f5es e servi\u00e7os de transforma\u00e7\u00e3o digital da Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":6,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/688\/revisions"}],"predecessor-version":[{"id":4382,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/688\/revisions\/4382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media?parent=688"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/product?post=688"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-industry?post=688"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-topic?post=688"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-type?post=688"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-subdirectory?post=688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}