{"id":737,"date":"2025-06-26T14:37:02","date_gmt":"2025-06-26T18:37:02","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/"},"modified":"2026-04-15T13:51:44","modified_gmt":"2026-04-15T17:51:44","slug":"maximize-security-of-adabas-data","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/","title":{"rendered":"Maximize a seguran\u00e7a dos\nseus dados Adabas"},"content":{"rendered":"<div class=\"wp-block-cover alignfull sag-super-hero\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"540\" class=\"wp-block-cover__image-background wp-image-2297 size-full\" alt=\"\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data.jpeg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data.jpeg 1920w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data-300x84.jpeg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data-1024x288.jpeg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data-768x216.jpeg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data-1536x432.jpeg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/hero-secure-data-18x5.jpeg 18w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\" style=\"background-color:#344057\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h6 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-9470ebfa85a553a704982fc621a85187\" id=\"h-ebook\">EBOOK<\/h6>\n\n\n<h1 style=\"margin-top:var(--wp--preset--spacing--m);\" class=\"has-link-color alignwide wp-elements-9182c0534dd5ea4e3b36a52a84a47eef wp-block-post-title has-text-color has-white-color\">Maximize a seguran\u00e7a dos\nseus dados Adabas<\/h1>\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-8424b8d75cde78b038fa6358c6182fa0\" style=\"margin-top:var(--wp--preset--spacing--s)\">Descubra como a criptografia, o controle de acesso e a auditoria podem proporcionar seguran\u00e7a pervasiva e uma vis\u00e3o completa da atividade no Adabas.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-changing-threats-call-for-a-new-approach-to-security\">Amea\u00e7as em constante mudan\u00e7a exigem uma nova abordagem para a seguran\u00e7a<\/h2>\n\n\n\n<p>Os riscos de seguran\u00e7a enfrentados pelos dados Adabas s\u00e3o mais altos do que nunca, pois seu mainframe est\u00e1 mais exposto. Mais ferramentas e aplica\u00e7\u00f5es est\u00e3o acessando e manipulando dados para an\u00e1lises, intelig\u00eancia e processamento em tempo real. Os sistemas corporativos tamb\u00e9m est\u00e3o mais interconectados, com redes distribu\u00eddas e a internet sendo usadas nas opera\u00e7\u00f5es di\u00e1rias.<\/p>\n\n\n\n<p>Como voc\u00ea evitar\u00e1 o acesso malicioso antes que ele prejudique suas opera\u00e7\u00f5es ou fa\u00e7a os clientes perderem a confian\u00e7a? Voc\u00ea tem visibilidade total sobre a atividade do seu banco de dados para detectar o uso n\u00e3o autorizado, especialmente quando mais da metade das viola\u00e7\u00f5es de banco de dados v\u00eam de usu\u00e1rios internos? Voc\u00ea est\u00e1 preparado para responder a auditorias de seguran\u00e7a e exig\u00eancias de conformidade?<\/p>\n\n\n\n<p>Neste ambiente, voc\u00ea precisa de recursos aprimorados do Adabas e da plataforma IBM Z\u00ae para proteger seus dados sens\u00edveis, independentemente de onde estejam e como sejam usados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"5960\" height=\"1180\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/3-product-teasers-v2.svg\" alt=\"\" class=\"wp-image-901\" style=\"width:856px;height:auto\"\/><figcaption class=\"wp-element-caption\">1. Relat\u00f3rio de amea\u00e7as internas da Verizon<br>2. Relat\u00f3rio IBM 2022 sobre o custo de uma viola\u00e7\u00e3o de dados<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-protect-and-monitor-your-most-valuable-data\">Proteja e monitore seus dados mais valiosos<\/h2>\n\n\n\n<p>Em um ambiente com ataques maliciosos crescentes, tanto de fontes externas quanto internas, e maior conectividade dos seus sistemas Adabas, voc\u00ea precisa de seguran\u00e7a abrangente para o banco de dados. Proteger dados sens\u00edveis vai al\u00e9m da conformidade; significa manter a confian\u00e7a dos clientes e a vantagem competitiva.&nbsp;<\/p>\n\n\n\n<p>\u00c9 hora de revisar sua abordagem de ciberseguran\u00e7a para proteger seus dados em repouso, em uso e em tr\u00e2nsito. Adote o que h\u00e1 de mais moderno em criptografia para reduzir os riscos e custos de uma viola\u00e7\u00e3o de dados e ajudar a atender \u00e0s complexas exig\u00eancias de conformidade. Autentique os usu\u00e1rios para evitar acessos n\u00e3o autorizados e fa\u00e7a auditorias para obter visibilidade completa da atividade do banco de dados, prevenindo fraudes internas e protegendo sua empresa e seus colaboradores. Juntas, essas solu\u00e7\u00f5es podem manter seus sistemas Adabas seguros e confi\u00e1veis por muitos anos.<br><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center has-gray-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/verified-user.svg\" alt=\"\" class=\"wp-image-2308\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-medium-font-size\">Proteja seus dados Adabas em repouso com criptografia de ponta.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-gray-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/wifi-password.svg\" alt=\"\" class=\"wp-image-2309\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-medium-font-size\">Proteja dados em tr\u00e2nsito com comunica\u00e7\u00e3o segura e criptografada.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center has-gray-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/admin-panel-settings.svg\" alt=\"\" class=\"wp-image-2306\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-medium-font-size\">Proteja dados em uso com controle sobre perfis de usu\u00e1rios e acesso.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-gray-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/security-update-warning.svg\" alt=\"\" class=\"wp-image-2307\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-medium-font-size\">Audite todas as atividades do banco de dados para detectar acesso n\u00e3o autorizado.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-encrypt-to-protect-data-at-rest\">Criptografe para proteger dados em repouso<\/h2>\n\n\n\n<p>Criptografe seus dados Adabas com o que h\u00e1 de mais moderno em seguran\u00e7a. Simplifique a administra\u00e7\u00e3o com gerenciamento de chaves corporativas f\u00e1cil de usar, ajudando a proteger suas informa\u00e7\u00f5es contra acessos n\u00e3o autorizados.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\">O Adabas Encryption para z\/OS<\/a> amplia os benef\u00edcios de seguran\u00e7a e confiabilidade da criptografia pervasiva baseada em hardware da IBM para os conjuntos de dados Adabas. O IBM Z oferece criptografia de alta velocidade e gerenciamento de chaves para uma prote\u00e7\u00e3o ampla com desempenho r\u00e1pido do banco de dados. Voc\u00ea pode optar por aplicar criptografia seletiva ou criptografar seus conjuntos completos de dados Adabas.<\/p>\n\n\n\n<p>O Adabas Encryption oferece maior seguran\u00e7a do que a criptografia no n\u00edvel do disco, que apenas protege contra o roubo de m\u00eddias f\u00edsicas. A criptografia n\u00e3o requer altera\u00e7\u00f5es em suas aplica\u00e7\u00f5es. Voc\u00ea pode continuar fornecendo dados para todos os seus programas, usu\u00e1rios e servi\u00e7os autorizados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1204\" height=\"1147\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2024\/06\/adabas-encryption-zos-graphic-02.svg\" alt=\"\" class=\"wp-image-612\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n    <section\n        class=\"o-testimonials-slider\"\n        data-testimonials-slider\n aria-label=\"Testimonials\"\n    >\n        <div class=\"o-testimonials-slider__inner\">\n            \n            <div\n                id=\"testimonials-slider-1\"\n                class=\"o-testimonials-slider__viewport swiper\"\n                tabindex=\"0\"\n            >\n                <div class=\"o-testimonials-slider__track swiper-wrapper\" role=\"list\">\n                                            <article\n                            class=\"o-testimonials-slider__slide swiper-slide\"\n                            role=\"listitem\"\n                            aria-label=\"Testimonial 1 of 1\"\n                        >\n                            <blockquote class=\"o-testimonials-slider__quote\">\n                                <p>\n                                    <span class=\"quotation--opening\">\u201c<\/span>\n                                    O uso extensivo de criptografia \u00e9 uma das maneiras mais eficazes de ajudar a reduzir os riscos e as perdas financeiras de uma viola\u00e7\u00e3o de dados e contribuir para o cumprimento de exig\u00eancias complexas de conformidade.\n                                    <span class=\"quotation--closing\">\u201d<\/span>\n                                <\/p>\n                            <\/blockquote>\n\n                                                            <p class=\"o-testimonials-slider__attribution\">\n                                    <span\n                                        class=\"o-testimonials-slider__attribution-line o-testimonials-slider__attribution-line--person\"\n                                    >\n                                        <span\n                                            class=\"o-testimonials-slider__attribution-marker\"\n                                            aria-hidden=\"true\"\n                                        >\n                                            \u2014\n                                        <\/span>\n                                                                                <span>Michael Jordan, IBM Distinguished Engineer<\/span>\n                                        <\/span>\n\n                                                                            <span\n                                            class=\"o-testimonials-slider__attribution-line o-testimonials-slider__attribution-line--company\"\n                                        >\n                                                                                            <span>Z Security<\/span>\n                                                                                    <\/span>\n                                                                    <\/p>\n                                                    <\/article>\n                                    <\/div>\n            <\/div>\n\n                    <\/div>\n    <\/section>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-control-access-to-protect-data-in-use\">Controle o acesso para proteger dados em uso<\/h2>\n\n\n\n<p>A autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o do Adabas permitem que voc\u00ea entregue dados cont\u00ednuos para programas, usu\u00e1rios e servi\u00e7os autorizados. Todas as utilidades do Adabas podem trabalhar com dados criptografados sem requerimentos de altera\u00e7\u00f5es. A gest\u00e3o \u00e9 simplificada por meio de utilit\u00e1rios existentes para carregar, descarregar, restaurar, fazer backup e outras fun\u00e7\u00f5es.<\/p>\n\n\n\n<p class=\"translation-block\">O Adabas SAF Security garante que seus dados sejam protegidos com m\u00e9todos de seguran\u00e7a comprovados e padr\u00e3o do mercado. Ao utilizar perfis e se conectar diretamente com o IBM Resource Access Control Facility (RACF), CA-ACF2\u00ae ou CA-Top Secret\u00ae para privacidade dos dados, voc\u00ea pode ter a confian\u00e7a de que esses gerenciadores de recursos concedem acesso apenas aos usu\u00e1rios autorizados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"3953\" height=\"1896\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/2-product-teasers-v2.svg\" alt=\"\" class=\"wp-image-902\" style=\"width:856px;height:auto\"\/><figcaption class=\"wp-element-caption\">1. Relat\u00f3rio IBM 2020 sobre o custo de uma viola\u00e7\u00e3o de dados<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-communications-to-protect-data-in-flight\">Mantenha a seguran\u00e7a nas comunica\u00e7\u00f5es para proteger dados em tr\u00e2nsito<\/h2>\n\n\n\n<p>Proteja seus dados no ponto mais vulner\u00e1vel: em redes p\u00fablicas, entre as aplica\u00e7\u00f5es de miss\u00e3o cr\u00edtica e o banco de dados Adabas. As solu\u00e7\u00f5es Adabas criptografam os dados antes de envi\u00e1-los pela rede e os descriptografam ao retornarem, tornando o processo transparente para a aplica\u00e7\u00e3o.<\/p>\n\n\n\n<p>Voc\u00ea pode implementar criptografia para proteger dados em tr\u00e2nsito sem precisar alterar suas aplica\u00e7\u00f5es existentes. A criptografia do Entire Net-Work utiliza negocia\u00e7\u00f5es de seguran\u00e7a e criptografia de protocolos de transporte de seguran\u00e7a padr\u00e3o do mercado, como TCP\/IP e AT-TLS, para proteger seus dados enquanto eles trafegam por redes privadas e p\u00fablicas, incluindo a internet, entre o Adabas e qualquer aplica\u00e7\u00e3o.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1227\" height=\"1080\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-data-nucleus-graphic-04.svg\" alt=\"\" class=\"wp-image-903\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-detect-unauthorized-access-with-complete-auditability\">Identifique acessos n\u00e3o autorizados com auditoria completa<\/h2>\n\n\n\n<p>Para detectar acessos n\u00e3o autorizados, voc\u00ea precisa de uma solu\u00e7\u00e3o de ciberseguran\u00e7a que ofere\u00e7a visibilidade total da atividade do seu banco de dados: quem est\u00e1 lendo ou alterando seus dados, as mudan\u00e7as realizadas, quando e onde a atividade ocorreu e quais aplica\u00e7\u00f5es foram usadas para acessar seus dados.<\/p>\n\n\n\n<p>Aprimore sua ciberseguran\u00e7a com uma solu\u00e7\u00e3o poderosa e intuitiva baseada na web, que ajuda sua organiza\u00e7\u00e3o a proteger dados e a cumprir com regulamenta\u00e7\u00f5es cada vez mais rigorosas. Em seguida, rastreie e armazene os dados de auditoria com seguran\u00e7a em arquivos de longo prazo, indexados e protegidos, para que seus dados permane\u00e7am seguros e estejam dispon\u00edveis sempre que voc\u00ea precisar revis\u00e1-los. Com o <a href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/facts-adabas-auditing\/\">Adabas Auditing for z\/O<\/a><a previewlistener=\"true\" href=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/fs_adabas-auditing-for-zos_en.pdf.sagdownload.inline.1618561887369.pdf\" data-no-translation>S<\/a> voc\u00ea pode:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Capacitar auditores e profissionais respons\u00e1veis por seguran\u00e7a a certificar que os sistemas de TI seguem padr\u00f5es de qualidade e regulamenta\u00e7\u00f5es<\/li>\n\n\n\n<li>Permitir que administradores de banco de dados rastreiem todos os acessos e atividade no banco de dados<\/li>\n\n\n\n<li>Dar suporte aos respons\u00e1veis pela prote\u00e7\u00e3o de dados com ferramentas para responder rapidamente a auditorias de seguran\u00e7a<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1180\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-auditing-zos-graphic-03.svg\" alt=\"\" class=\"wp-image-904\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-upgrade-your-security-with-ibm-z15-and-z16\">Atualize sua seguran\u00e7a com o IBM z15 e z16<\/h2>\n\n\n\n<p>A criptografia pervasiva do IBM Z oferece um guarda-chuva de funcionalidades para a plataforma IBM Z, para cumprir com regulamenta\u00e7\u00f5es complexas de compliance, enquanto reduz os riscos e as perdas financeiras de uma viola\u00e7\u00e3o de dados. A criptografia pervasiva da IBM e as solu\u00e7\u00f5es de seguran\u00e7a do Adabas operam nas tr\u00eas vers\u00f5es mais recentes do IBM Z. Com a criptografia de dados da IBM em todos os lugares, voc\u00ea pode proteger seus dados on-premises ou em tr\u00e2nsito, processando at\u00e9 19 bilh\u00f5es de transa\u00e7\u00f5es totalmente criptografadas por dia, ao mesmo tempo em que gerencia a privacidade por meio de pol\u00edticas. A plataforma IBM Z oferece maior velocidade, escalabilidade, seguran\u00e7a e a alta disponibilidade exigidas pelas organiza\u00e7\u00f5es atuais.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.ibm.com\/z\">Saiba mais sobre o IBM Z<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.ibm.com\/z\/security\"><strong>Explore a Criptografia Pervasiva da IBM<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero-1024x576.jpg\" alt=\"\" class=\"wp-image-563\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero-1024x576.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero-300x169.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero-768x432.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero-1536x864.jpg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/blog-3-steps-enhance-adabas-security-hero.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-you-may-also-like\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Recursos recomendados<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"\u00edcone de l\u00e2mpada\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Mantenha-se conectado<\/h4>\n\n\n\n<p class=\"translation-block\">Fa\u00e7a parte da comunidade e acompanhe as \u00faltimas not\u00edcias sobre Adabas &amp; Natural na TechCommunity da <span class=\"nowrap\">Software AG<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/\">Visite a Tech Community<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"\u00edcone do laptop\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Conhe\u00e7a as novidades<\/h4>\n\n\n\n<p class=\"translation-block\">Descubra as \u00faltimas inova\u00e7\u00f5es, assista \u00e0 webinars e veja como o <span class=\"nowrap\">Adabas &amp; Natural<\/span> est\u00e3o prontos para 2050 e al\u00e9m.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/adabas-natural\/\">Saiba mais<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"\u00edcone do globo\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Grupos de Usu\u00e1rios<\/h4>\n\n\n\n<p>Participe de um dos nossos Grupos de Usu\u00e1rios para se conectar com colegas de todo o mundo.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--6\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/developer\/usergroup\/\">Participe<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-b8d6f6f931fae20ac61d525c023df76b\" id=\"h-want-to-make-your-core-applications-future-ready\">Quer tornar as suas aplica\u00e7\u00f5es de miss\u00e3o cr\u00edtica prontas para o futuro?<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e04203c2fbc13876bd23d5f3081c4d1d translation-block\">Construa sob o seu legado. Acelere o desenvolvimento em um ambiente DevOps moderno. Modernize suas aplica\u00e7\u00f5es Adabas &amp; Natural para reduzir custos e adotar a nuvem h\u00edbrida.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--7\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/br\/contact\/\">Fale com um especialista<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-dark-bg-transparent is-style-dark-bg-transparent--8\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/t\/adabas-natural-community-edition-for-docker-download\/235228\">Teste gratuito<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignwide is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--9\"><a class=\"wp-block-button__link has-white-color has-text-color has-link-color has-text-align-left wp-element-button\" href=\"https:\/\/discover.softwareag.com\/free-it-health-checks.html\">Solicite uma avalia\u00e7\u00e3o gratuita do estado da sua TI<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Saiba como a criptografia, o controle de acesso e a auditoria podem proteger seus dados da Adabas contra amea\u00e7as, garantindo seguran\u00e7a e conformidade abrangentes.<\/p>","protected":false},"featured_media":738,"template":"","product":[66],"resource-industry":[],"resource-topic":[78],"resource-type":[33],"resource-subdirectory":[64],"class_list":["post-737","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-security","resource-type-ebook","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Maximize the security of your Adabas data | Software AG<\/title>\n<meta name=\"description\" content=\"Learn how encryption, access control, and auditing can protect your Adabas data from threats, ensuring comprehensive security and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maximize the security of your Adabas data\" \/>\n<meta property=\"og:description\" content=\"Learn how encryption, access control, and auditing can protect your Adabas data from threats, ensuring comprehensive security and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T17:51:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"932\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Maximize the security of your Adabas data\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\",\"name\":\"Maximize the security of your Adabas data | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg\",\"datePublished\":\"2025-06-26T18:37:02+00:00\",\"dateModified\":\"2026-04-15T17:51:44+00:00\",\"description\":\"Learn how encryption, access control, and auditing can protect your Adabas data from threats, ensuring comprehensive security and compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg\",\"width\":932,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Maximize the security of your Adabas data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Maximize the security of your Adabas data | Software AG","description":"Saiba como a criptografia, o controle de acesso e a auditoria podem proteger seus dados da Adabas contra amea\u00e7as, garantindo seguran\u00e7a e conformidade abrangentes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/","og_locale":"pt_BR","og_type":"article","og_title":"Maximize the security of your Adabas data","og_description":"Learn how encryption, access control, and auditing can protect your Adabas data from threats, ensuring comprehensive security and compliance.","og_url":"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2026-04-15T17:51:44+00:00","og_image":[{"width":932,"height":350,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Maximize the security of your Adabas data","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/","name":"Maximize the security of your Adabas data | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg","datePublished":"2025-06-26T18:37:02+00:00","dateModified":"2026-04-15T17:51:44+00:00","description":"Saiba como a criptografia, o controle de acesso e a auditoria podem proteger seus dados da Adabas contra amea\u00e7as, garantindo seguran\u00e7a e conformidade abrangentes.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-security-wide-thumbnail.jpg","width":932,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Maximize the security of your Adabas data"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Solu\u00e7\u00f5es e servi\u00e7os de transforma\u00e7\u00e3o digital da Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":15,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/737\/revisions"}],"predecessor-version":[{"id":6958,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource\/737\/revisions\/6958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media\/738"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media?parent=737"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/product?post=737"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-industry?post=737"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-topic?post=737"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-type?post=737"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/resource-subdirectory?post=737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}