{"id":682,"date":"2023-04-05T15:21:11","date_gmt":"2023-04-05T19:21:11","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas_natural_encryption-zos\/"},"modified":"2025-12-20T18:51:22","modified_gmt":"2025-12-20T22:51:22","slug":"adabas-natural-encryption-zos","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","title":{"rendered":"Adabas Encryption for z\/OS\u00ae"},"content":{"rendered":"<p>Adabas Encryption f\u00fcr z\/OS hilft Ihnen, Ihre Daten zu sch\u00fctzen und die wachsenden Sicherheitsvorschriften einzuhalten. Verschl\u00fcsseln Sie Ihre gesamte Datenbank oder bestimmte Datens\u00e4tze mithilfe der leistungsstarken und sicheren hardwarebasierten nativen Verschl\u00fcsselungsfunktionen von <a href=\"https:\/\/www.softwareag.com\/de\/adabas-natural\/ibm-z-mainframe\/\">IBM zSysteme<sup>TM<\/sup><\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-maintain-database-performance\">Anwendung marktf\u00fchrender Sicherheitsma\u00dfnahmen, Aufrechterhaltung der Datenbankleistung<\/h2>\n\n\n\n<p>Unternehmen, die <a href=\"https:\/\/www.softwareag.com\/de\/adabas-natural\/\">Adabas<\/a> auf IBM z\/OS einsetzen, haben \u00fcber Jahrzehnte hinweg wertvolle Informationen generiert, darunter Finanzdaten, pers\u00f6nliche Dateien und gesch\u00fctztes Gesch\u00e4ftsmaterial. Wachsende regulatorische Anforderungen in Verbindung mit der Notwendigkeit immer strengerer Cybersecurity-Ma\u00dfnahmen machen es f\u00fcr Unternehmen unerl\u00e4sslich, ihre Informationen vor unbefugtem Zugriff zu sch\u00fctzen. IBM zSystems bietet sichere, hochleistungsf\u00e4hige Verschl\u00fcsselungsfunktionen, die branchenf\u00fchrende Datensicherheit erm\u00f6glichen. Adabas Encryption f\u00fcr z\/OS nutzt diese kryptografischen Dienste in einem benutzerfreundlichen Tool, mit dem Unternehmen ganze Datenbanken oder bestimmte Datens\u00e4tze in einem rationalisierten Prozess sch\u00fctzen k\u00f6nnen. Jetzt k\u00f6nnen Sie leistungsstarke Datenbanken pflegen und gleichzeitig die Sicherheit erh\u00f6hen und die Einhaltung einer wachsenden Zahl von Vorschriften wie HIPAA, SOX, PCI DSS und GDPR gew\u00e4hrleisten. Durch den Einsatz von Adabas Encryption f\u00fcr z\/OS zusammen mit Adabas SAF Security werden Ihre Daten im Ruhezustand gleichzeitig gesichert und verschl\u00fcsselt. Zusammen mit Encryption for Entire Net-Work sch\u00fctzt CONNX Ihre Daten auch w\u00e4hrend der \u00dcbertragung. So bleiben Ihre Adabas-Systeme langfristig sicher und zuverl\u00e4ssig.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-complete-protection\">Vollst\u00e4ndiger Schutz<\/h3>\n\n\n\n<p class=\"translation-block\">Sch\u00fctzen und verschl\u00fcsseln Sie Ihre Daten im Ruhezustand mit Adabas Encryption for z\/OS \u2013 der ideale Partner f\u00fcr Adabas SAF Security. SAF Security sorgt daf\u00fcr, dass Ihre Daten mit bew\u00e4hrten, branchen\u00fcblichen Methoden gesichert werden, die in den meisten IBM z\/OS- und kompatiblen Systemen eingesetzt werden. Steuern Sie Ihre Systemressourcen \u00fcber Profile und integrieren Sie externe Sicherheitsl\u00f6sungen wie IBM RACF<sup>\u00ae<\/sup>, CA-ACF2<sup>\u00ae<\/sup> oder CA-Top Secret<sup>\u00ae<\/sup>. Dieses zentrale Kontroll- und Auditsystem reduziert den Verwaltungsaufwand, sodass Sie sich auf Ihr Kerngesch\u00e4ft konzentrieren k\u00f6nnen. Danach k\u00f6nnen Sie mit Adabas Encryption for z\/OS beliebige oder alle Adabas-Dateien zuverl\u00e4ssig verschl\u00fcsseln.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-benefits\">Hauptvorteile<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Erf\u00fcllen Sie die sich entwickelnden Datenschutzbestimmungen effizient und vollst\u00e4ndig<\/li>\n\n\n\n<li>Sch\u00fctzen Sie Ihre Daten vor dem Zugriff unbefugter Personen<\/li>\n\n\n\n<li>Nutzen Sie die Sicherheits- und Zuverl\u00e4ssigkeitsvorteile der hardwarebasierten Verschl\u00fcsselung und Schl\u00fcsselverwaltung auf der IBM zSystems-Plattform<\/li>\n\n\n\n<li>Aufrechterhaltung einer schnellen Datenbankleistung mit selektiver Datenverschl\u00fcsselung<\/li>\n\n\n\n<li>Out-of-the-Box-L\u00f6sung mit Herstellerunterst\u00fctzung<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1930\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-encryption-zos-graphic-02-de.svg\" alt=\"\" class=\"wp-image-679\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-capabilities\">Zentrale F\u00e4higkeiten<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-customize-encryption\">Verschl\u00fcsselung anpassen<\/h4>\n\n\n\n<p>W\u00e4hlen Sie den Umfang der Datenverschl\u00fcsselung, der Ihren Anforderungen entspricht: Verschl\u00fcsseln Sie Ihre gesamte Datenbank oder verschl\u00fcsseln Sie bestimmte Datens\u00e4tze auf Dateiebene.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-performance-with-targeted-security\">Leistungsf\u00e4higkeit mit gezielter Sicherheit aufrechterhalten<\/h4>\n\n\n\n<p>Verschl\u00fcsseln Sie nur die notwendigen Daten, um den Prozess zu rationalisieren und die CPU-Auslastung zu reduzieren.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Zentrales Key Management leicht gemacht<\/h4>\n\n\n\n<p>Optimieren Sie den regelm\u00e4\u00dfigen Wechsel von Verschl\u00fcsselungscodes mit dem sicheren Schl\u00fcssel- und Zertifikatsmanagementsystem von IBM.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Zugriff f\u00fcr autorisierte Tools erhalten<\/h4>\n\n\n\n<p>Stellen Sie autorisierten Programmen, Benutzern und Diensten ununterbrochen Daten zur Verf\u00fcgung. Alle Adabas-Dienstprogramme k\u00f6nnen mit verschl\u00fcsselten Daten arbeiten, ohne dass \u00c4nderungen erforderlich sind.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-management\">Vereinfachen Sie die Verwaltung<\/h4>\n\n\n\n<p>Verwalten Sie Ihre Datenbank mit vorhandenen Dienstprogrammen zum Laden, Entladen, Wiederherstellen, Sichern und anderen Funktionen.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-support-your-ibm-ziip-investment\">Unterst\u00fctzen Sie Ihre IBM zIIP\u2122-Investition<\/h4>\n\n\n\n<p>Adabas Encryption f\u00fcr z\/OS ist vollst\u00e4ndig konform und funktional f\u00fcr Kunden, die ihre Arbeit auf zIIP-Prozessoren verlagern.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-it-works\">Wie es funktioniert<\/h3>\n\n\n\n<p>IBM zSystems bieten Ihrem Unternehmen eine Reihe von Funktionen, die von Adabas Encryption f\u00fcr z\/OS genutzt werden, einschlie\u00dflich hardwarebasierter Verschl\u00fcsselung und Funktionen zur Verwaltung von Zugriff und Unternehmensschl\u00fcsseln. Der erste Schritt zu einer umfassenden L\u00f6sung f\u00fcr die Verschl\u00fcsselung von Unternehmensdaten ist die Konfiguration Ihrer zSysteme f\u00fcr Verschl\u00fcsselungsdienste.<\/p>\n\n\n\n<p>Neuere IBM-Modelle sind mit einem Softwareelement namens Integrated Cryptographic Service Facility (ICSF) ausgestattet, das mit der vorhandenen Hardware zusammenarbeitet und unter anderem folgende Funktionen bietet:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resource Access Control Facility (RACF) unterst\u00fctzt den Datenschutz, indem Entscheidungen \u00fcber die Zugriffskontrolle durch Ressourcenmanager getroffen werden, wobei der Zugriff nur autorisierten Benutzern gew\u00e4hrt wird<\/li>\n\n\n\n<li>IBM Enterprise Key Management Foundation (EKMF) ist ein hochsicheres Schl\u00fcsselverwaltungssystem, das einen zentralisierten Service f\u00fcr eine rationalisierte, effiziente und sichere Schl\u00fcssel- und Zertifikatsverwaltung bietet<\/li>\n\n\n\n<li>Central Processor Assist for Cryptographic Function (CPACF) bietet Leistungsverbesserungen bei der Hardware-Beschleunigung, wodurch die Unterst\u00fctzung einer weit verbreiteten Verschl\u00fcsselung kosteneffizient wird.<\/li>\n<\/ul>\n\n\n\n<p>Nach der Konfiguration Ihres IBM zSystems k\u00f6nnen Sie Adabas Encryption f\u00fcr z\/OS einsetzen, um Ihre Daten zu sch\u00fctzen und die Einhaltung von Vorschriften zu gew\u00e4hrleisten.<\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-take-the-next-step\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Machen Sie den n\u00e4chsten Schritt:<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"Gl\u00fchbirnen-Symbol\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Bleiben Sie verbunden<\/h4>\n\n\n\n<p class=\"translation-block\">Treten Sie der Community bei und verfolgen Sie die neuesten Nachrichten zu Adabas &amp; Natural in der <span class=\"nowrap\">Software AG<\/span> Tech Community.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Besuchen Sie die Tech Community<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"Laptop-Symbol\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Neuigkeiten entdecken<\/h4>\n\n\n\n<p class=\"translation-block\">Entdecken Sie die neuesten Innovationen, sehen Sie sich Webinare an und erfahren Sie, wie <span class=\"nowrap\">Adabas &amp; Natural<\/span> f\u00fcr 2050 und dar\u00fcber hinaus ger\u00fcstet ist.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/adabas-natural\/\">Mehr erfahren<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"Globus-Symbol\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Internationale Benutzergruppen<\/h4>\n\n\n\n<p>Werden Sie Teil einer User Group und kn\u00fcpfen Sie weltweit Kontakte mit Ihren Kolleg:innen.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/developer\/usergroup\/\">Mehr erfahren<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-c2f60aabc78c1f9ec73b811d629a3db1\" id=\"h-see-decide-amp-act-with-software-ag\">Sehen, entscheiden &amp; handeln mit Software AG<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-f681796f63d5098c350294242f01a703\">Um mehr zu erfahren, wenden Sie sich an Ihren Software AG-Ansprechpartner oder besuchen Sie uns unter www.adabasnatural.com.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sprechen Sie mit einem Experten<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Sch\u00fctzen Sie Ihre Daten und erf\u00fcllen Sie Sicherheitsvorgaben mit IBM Z: Verschl\u00fcsseln Sie ganze Datenbanken oder einzelne Dateien sicher und zuverl\u00e4ssig.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[72,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-682","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-mainframe","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for z\/OS: Protect Your Sensitive Data | Software AG<\/title>\n<meta name=\"description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta property=\"og:description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"name\":\"Encryption for z\/OS: Protect Your Sensitive Data | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-04-05T19:21:11+00:00\",\"dateModified\":\"2025-12-20T22:51:22+00:00\",\"description\":\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for z\/OS\u00ae\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_locale":"de_DE","og_type":"article","og_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","og_description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","og_url":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:51:22+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","name":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-04-05T19:21:11+00:00","dateModified":"2025-12-20T22:51:22+00:00","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for z\/OS\u00ae"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"L\u00f6sungen und Dienstleistungen der Software AG f\u00fcr die digitale Transformation","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/682\/revisions"}],"predecessor-version":[{"id":4390,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/682\/revisions\/4390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/media?parent=682"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/product?post=682"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-industry?post=682"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-topic?post=682"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-type?post=682"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-subdirectory?post=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}