{"id":688,"date":"2023-07-25T10:36:49","date_gmt":"2023-07-25T14:36:49","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"},"modified":"2025-12-20T18:36:46","modified_gmt":"2025-12-20T22:36:46","slug":"adabas-encryption-linux","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-encryption-linux\/","title":{"rendered":"Adabas Encryption f\u00fcr Linux"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-on-premises-and-in-the-cloud\">Setzen Sie branchenf\u00fchrende Sicherheitsma\u00dfnahmen lokal und in der Cloud ein<\/h2>\n\n\n\n<p>Wachsende gesetzliche Anforderungen in Verbindung mit immer strengeren Cybersecurity-Ma\u00dfnahmen machen es f\u00fcr Sie unerl\u00e4sslich, Ihre wertvollen Informationen vor unbefugtem Zugriff zu sch\u00fctzen. Adabas Encryption for Linux hilft Ihnen, Ihre Daten zu sch\u00fctzen und die wachsenden Sicherheitsvorschriften einzuhalten.Sch\u00fctzen Sie Daten im Ruhezustand und w\u00e4hrend der \u00dcbertragung mit branchenf\u00fchrender Verschl\u00fcsselung, die unabh\u00e4ngig vom Einsatzort Ihres Systems funktioniert. Mit Adabas Encryption for Linux k\u00f6nnen Sie Ihre bew\u00e4hrten Anwendungen nahezu \u00fcberall ausf\u00fchren und Ihre Adabas-Daten \u00fcberall sichern. Nutzen Sie die Skalierbarkeit und Reaktionsf\u00e4higkeit virtueller Maschinen und Container und betreiben Sie Ihre Systeme bei Ihrem bevorzugten Cloud-Anbieter, w\u00e4hrend Sie Ihre Daten mit modernsten Verschl\u00fcsselungsstandards sch\u00fctzen.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-complete-protection\">Vollst\u00e4ndiger Schutz<\/h2>\n\n\n\n<p>Unter Linux k\u00f6nnen Sie Ihre <a href=\"https:\/\/www.softwareag.com\/de\/adabas-natural\/\">Adabas<\/a> -Daten im Ruhezustand, w\u00e4hrend der \u00dcbertragung und sogar w\u00e4hrend der Nutzung sch\u00fctzen - ganz ohne \u00c4nderungen an der Anwendung und ohne Beeintr\u00e4chtigung der zuverl\u00e4ssigen Performance.\nAdabas Encryption for Linux sch\u00fctzt Daten w\u00e4hrend der \u00dcbertragung durch TLS- und OpenSSL-basierte direkte TCP\/IP-Verbindungen zum Adabas-Nucleus. Zus\u00e4tzlich sichert es sensible ruhende Daten mit einer softwarebasierten L\u00f6sung, die den Advanced Encryption Standard (AES) gem\u00e4\u00df NIST auf Datenbankebene unterst\u00fctzt. So bleiben Ihre Daten selbst dann verschl\u00fcsselt und gesch\u00fctzt, wenn ein unbefugter Zugriff auf den Speichercontainer erfolgt.\nDank der rollenbasierten Zugriffskontrolle in Adabas for Linux l\u00e4sst sich auch der Zugriff auf aktiv genutzte Daten absichern - durch gezielte Steuerung von Benutzerprofilen und Zugriffsrechten.\nAdabas Encryption enth\u00e4lt au\u00dferdem einen sofort einsatzbereiten, integrierten Keystore, der eine einfache Verwaltung von Verschl\u00fcsselungs- und Zugriffsschl\u00fcsseln erm\u00f6glicht - und gleichzeitig eine langfristig sichere Datenarchivierung unterst\u00fctzt.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-benefits\">Hauptvorteile<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Erf\u00fcllen Sie die sich entwickelnden Datenschutzbestimmungen effizient und vollst\u00e4ndig<\/li>\n\n\n\n<li>Sch\u00fctzen Sie Ihre Daten vor dem Zugriff unbefugter Personen<\/li>\n\n\n\n<li>Nutzen Sie fortschrittliche Verschl\u00fcsselung mit AES-Schl\u00fcsseln nach Industriestandard (128 und 256 Bit)<\/li>\n\n\n\n<li>Verwalten Sie Verschl\u00fcsselungs- und Zugriffsschl\u00fcssel einfach und zentral<\/li>\n\n\n\n<li>Sichern Sie ruhende und \u00fcbertragene Daten - ganz ohne \u00c4nderungen an bestehenden Anwendungen<\/li>\n\n\n\n<li>Passen Sie den Schutz individuell an und verschl\u00fcsseln Sie nur ausgew\u00e4hlte Datenbanken<\/li>\n\n\n\n<li>Sofort einsetzbare, herstellerunterst\u00fctzte L\u00f6sung - keine zus\u00e4tzlichen Installationen erforderlich<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/softwareag.scene7.com\/is\/image\/softwareagprod\/ds-adabas-encryption-for-linux-graphic-1?$PNGwithAlpha$&amp;wid=1260&amp;dpr=off\" alt=\"\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-features\">Funktionen<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-encrypt-on-linux-everywhere\">Verschl\u00fcsseln - \u00fcberall unter Linux<\/h5>\n\n\n\n<p>Wenden Sie dieselbe fortschrittliche Verschl\u00fcsselungsl\u00f6sung auf virtuelle Maschinen und Container an - egal ob lokal oder in der Cloud betrieben.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Zentrales Key Management leicht gemacht<\/h5>\n\n\n\n<p>Vereinfachen Sie die Verwaltung Ihrer Verschl\u00fcsselung: Erstellen, speichern und verwalten Sie Schl\u00fcssel zentral \u00fcber einen Keystore im Dateiverwaltungssystem.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Zugriff f\u00fcr autorisierte Tools erhalten<\/h5>\n\n\n\n<p>Stellen Sie autorisierten Programmen, Benutzern und Diensten ununterbrochen Daten zur Verf\u00fcgung. Alle Adabas-Dienstprogramme k\u00f6nnen mit verschl\u00fcsselten Daten arbeiten, ohne dass \u00c4nderungen erforderlich sind.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-modernize-securely\">Sicher modernisieren<\/h5>\n\n\n\n<p>W\u00e4hlen Sie das Linux-Deployment, das zu Ihren Anforderungen passt - und passen Sie Ihre IT-Infrastruktur an, ohne Kompromisse bei der Sicherheit einzugehen.<br><\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-you-may-also-like\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Das k\u00f6nnte Sie auch interessieren:<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"Gl\u00fchbirnen-Symbol\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Bleiben Sie verbunden<\/h4>\n\n\n\n<p class=\"translation-block\">Treten Sie der Community bei und verfolgen Sie die neuesten Nachrichten zu Adabas &amp; Natural in der <span class=\"nowrap\">Software AG<\/span> Tech Community.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Besuchen Sie die Tech Community<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"Laptop-Symbol\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Neuigkeiten entdecken<\/h4>\n\n\n\n<p class=\"translation-block\">Entdecken Sie die neuesten Innovationen, sehen Sie sich Webinare an und erfahren Sie, wie <span class=\"nowrap\">Adabas &amp; Natural<\/span> f\u00fcr 2050 und dar\u00fcber hinaus ger\u00fcstet ist.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/adabas-natural\/\">Mehr erfahren<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"Globus-Symbol\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Internationale Benutzergruppen<\/h4>\n\n\n\n<p>Werden Sie Teil einer User Group und kn\u00fcpfen Sie weltweit Kontakte mit Ihren Kolleg:innen.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/developer\/usergroup\/\">Finden Sie Ihre Gruppe<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-b8d6f6f931fae20ac61d525c023df76b\" id=\"h-want-to-make-your-core-applications-future-ready\">M\u00f6chten Sie Ihre Kernanwendungen zukunftssicher machen?<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e04203c2fbc13876bd23d5f3081c4d1d translation-block\">Bauen Sie auf Ihrem Bestand auf. Beschleunigen Sie die Entwicklung in einer modernen DevOps-Umgebung. Modernisieren Sie Ihre <span class=\"nowrap\">Adabas &amp; Natural<\/span>-Anwendungen, um Kosten zu senken und Hybrid-Cloud-Strategien zu nutzen.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/de\/contact\/\">Sprechen Sie mit einem Experten<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-dark-bg-transparent is-style-dark-bg-transparent--5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/t\/adabas-natural-community-edition-for-docker-download\/235228\">Unverbindlich ausprobieren<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignwide is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--6\"><a class=\"wp-block-button__link has-white-color has-text-color has-link-color has-text-align-left wp-element-button\" href=\"https:\/\/discover.softwareag.com\/free-it-health-checks.html\">Fordern Sie einen kostenlosen IT-Gesundheitscheck an<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Mit Adabas Encryption for Linux f\u00fchren Sie Ihre bew\u00e4hrten Anwendungen praktisch \u00fcberall aus - und sichern Ihre Adabas-Daten umfassend und standortunabh\u00e4ngig.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[76,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-688","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-linux-cloud","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for Linux: Protect Your Data Today | Software AG<\/title>\n<meta name=\"description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta property=\"og:description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"name\":\"Encryption for Linux: Protect Your Data Today | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-07-25T14:36:49+00:00\",\"dateModified\":\"2025-12-20T22:36:46+00:00\",\"description\":\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for Linux: Protect Your Data Today | Software AG","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-encryption-linux\/","og_locale":"de_DE","og_type":"article","og_title":"Adabas Encryption for Linux","og_description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","og_url":"https:\/\/www.softwareag.com\/de\/resources\/adabas-natural\/adabas-encryption-linux\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:36:46+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for Linux","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","name":"Encryption for Linux: Protect Your Data Today | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-07-25T14:36:49+00:00","dateModified":"2025-12-20T22:36:46+00:00","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"L\u00f6sungen und Dienstleistungen der Software AG f\u00fcr die digitale Transformation","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":6,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/688\/revisions"}],"predecessor-version":[{"id":4382,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource\/688\/revisions\/4382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/media?parent=688"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/product?post=688"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-industry?post=688"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-topic?post=688"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-type?post=688"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/de\/wp-json\/wp\/v2\/resource-subdirectory?post=688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}