{"id":682,"date":"2023-04-05T15:21:11","date_gmt":"2023-04-05T19:21:11","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas_natural_encryption-zos\/"},"modified":"2025-12-20T18:51:22","modified_gmt":"2025-12-20T22:51:22","slug":"adabas-natural-encryption-zos","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","title":{"rendered":"Adabas Encryption for z\/OS\u00ae"},"content":{"rendered":"<p>Adabas Encryption for z\/OS helps you protect your data and stay fully compliant with growing security regulations. Encrypt your entire database, or specific data sets, using the powerful and secure hardware-based native encryption capabilities on <a href=\"https:\/\/www.softwareag.com\/es\/adabas-natural\/ibm-z-mainframe\/\">IBM zSystems<sup>TM<\/sup><\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-maintain-database-performance\">Apply industry-leading security, maintain database performance<\/h2>\n\n\n\n<p>Organizations running <a href=\"https:\/\/www.softwareag.com\/es\/adabas-natural\/\">Adabas<\/a> on IBM z\/OS have generated decades\u2019 worth of valuable information including financial data, personal files and proprietary business material. Growing regulatory demands, combined with a need for ever-stronger cybersecurity measures, make itcritical for organizations to protect their information against unauthorized access. IBM zSystems provide secure, high-performance encryption functions to enable industry-leading data security. Adabas Encryption for z\/OS leverages these cryptographic services in an easy-to-use tool that helps organizations protect entire databases, or specific data sets, in a streamlined process. Now, you can maintain high performance databases while boosting security and staying compliant with a growing list of regulations such as HIPAA, SOX, PCI DSS and GDPR. Using Adabas Encryption for z\/OS alongside Adabas SAF Security simultaneously secures and encrypts your data at rest. Used alongside Encryption for Entire Net-Work, you can also secure your data in flight. Together, these tools help keep your Adabas systems secure and reliable for years to come.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-complete-protection\">Protecci\u00f3n total<\/h3>\n\n\n\n<p class=\"translation-block\">To secure and encrypt your data at rest, Adabas Encryption for z\/OS is the perfect partner to Adabas SAF Security. Adabas SAF Security ensures your data is secured with proven, industry standard security methods used by most IBM z\/OS and compatible sites. You can control system resources by using profiles and connecting directly with external security tools such as IBM RACF<sup>\u00ae<\/sup>, CA-ACF2<sup>\u00ae<\/sup> or CA-Top Secret<sup>\u00ae<\/sup>. This single control and audit system for all your resources minimizes administrative efforts so you can focus on the tasks at hand. Once your data is secured, encrypt any or all of your Adabas files using Adabas Encryption for z\/OS.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-benefits\">Principales ventajas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cumplir de forma eficaz y completa la normativa sobre protecci\u00f3n de datos en constante evoluci\u00f3n<\/li>\n\n\n\n<li>Proteja sus datos contra el acceso de agentes no autorizados<\/li>\n\n\n\n<li>Leverage the security and reliability benefits of hardware-based encryption and key management on the IBM zSystems platform<\/li>\n\n\n\n<li>Maintain fast database performance with selective data encryption<\/li>\n\n\n\n<li>Out-of-the box vendor-supported solution<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1930\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/adabas-encryption-z-os-graphic-01.svg\" alt=\"\" class=\"wp-image-679\" style=\"width:856px;height:auto\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-capabilities\">Key capabilities<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-customize-encryption\">Customize encryption<\/h4>\n\n\n\n<p>Choose the extent of data encryption that suits your needs: encrypt your entire database, or encrypt specific data sets at the file level.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-performance-with-targeted-security\">Maintain performance with targeted security<\/h4>\n\n\n\n<p>Encrypt only the necessary data to streamline the process and reduce CPU use.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Simplifique la gesti\u00f3n de claves empresariales<\/h4>\n\n\n\n<p>Streamline periodic encryption keys changes using IBM\u2019s secure key and certificate management system.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Mantener el acceso de los servicios p\u00fablicos autorizados<\/h4>\n\n\n\n<p>Entregue datos sin interrupciones a programas, usuarios y servicios autorizados. Todas las utilidades Adabas pueden trabajar con datos encriptados sin requerir cambios.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-simplify-management\">Simplify management<\/h4>\n\n\n\n<p>Manage your database with existing utilities for loading, unloading, restore, backup and other functions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-support-your-ibm-ziip-investment\">Support your IBM zIIP\u2122 investment<\/h4>\n\n\n\n<p>Adabas Encryption for z\/OS is fully compliant and functional for customers offloading work to zIIP processors.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-it-works\">C\u00f3mo funciona<\/h3>\n\n\n\n<p>IBM zSystems&nbsp;provide your organization with a range of capabilities leveraged by Adabas Encryption for z\/OS, including hardware-based encryption and functions to manage access and enterprise keys. The first step to a comprehensive enterprise data encryption solution is to configure your zSystems for encryption services.<\/p>\n\n\n\n<p>Recent IBM models are equipped with a software element called Integrated Cryptographic Service Facility (ICSF), which works with existing hardware to provide features including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resource Access Control Facility (RACF) supports data privacy by making access control decisions through resource managers, with access granted only to authorized users.<\/li>\n\n\n\n<li>IBM Enterprise Key Management Foundation (EKMF) is a highly secure key management system that provides a centralized service for streamlined, efficient and secure key and certificate management.\u00b7<\/li>\n\n\n\n<li>Central Processor Assist for Cryptographic Function (CPACF) provides performance improvements in hardware acceleration, making it cost-effective to support pervasive encryption.<\/li>\n<\/ul>\n\n\n\n<p>With your IBM zSystems configured, you are ready to start using Adabas Encryption for z\/OS to protect your data and stay in regulatory compliance.<\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-take-the-next-step\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Conoce los beneficios:<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"icono de bombilla\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Mantente conectado<\/h4>\n\n\n\n<p class=\"translation-block\">\u00danase a la comunidad y siga las \u00faltimas noticias sobre Adabas &amp; Natural en la comunidad tecnol\u00f3gica de <span class=\"nowrap\">Software AG<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Visite nuestra comunidad tecnol\u00f3gica<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"icono de port\u00e1til\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Novedades<\/h4>\n\n\n\n<p class=\"translation-block\">Descubra las \u00faltimas innovaciones, vea seminarios web y compruebe c\u00f3mo <span class=\"nowrap\">Adabas &amp; Natural<\/span> est\u00e1 preparado para 2050 y m\u00e1s all\u00e1.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/adabas-natural\/\">Saber m\u00e1s<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"icono del globo\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Grupos internacionales de usuarios<\/h4>\n\n\n\n<p>\u00danase a uno de nuestros grupos de usuarios para establecer contactos con colegas de todo el mundo.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/developer\/usergroup\/\">Saber m\u00e1s<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-c2f60aabc78c1f9ec73b811d629a3db1\" id=\"h-see-decide-amp-act-with-software-ag\">Ve, decide y act\u00faa con Software AG<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-f681796f63d5098c350294242f01a703\">Para obtener m\u00e1s informaci\u00f3n, p\u00f3ngase en contacto con su representante de Software AG o vis\u00edtenos en www.adabasnatural.com.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Habla con nuestros expertos<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Protect your data and stay fully compliant with growing security regulations. Encrypt your entire database, or specific files, using the powerful and secure encryption capabilities on IBM Z.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[72,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-682","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-mainframe","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for z\/OS: Protect Your Sensitive Data | Software AG<\/title>\n<meta name=\"description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta property=\"og:description\" content=\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\",\"name\":\"Encryption for z\/OS: Protect Your Sensitive Data | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-04-05T19:21:11+00:00\",\"dateModified\":\"2025-12-20T22:51:22+00:00\",\"description\":\"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for z\/OS\u00ae\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_locale":"es_ES","og_type":"article","og_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","og_description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","og_url":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:51:22+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for z\/OS\u00ae Protect against unauthorized access","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/","name":"Encryption for z\/OS: Protect Your Sensitive Data | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-04-05T19:21:11+00:00","dateModified":"2025-12-20T22:51:22+00:00","description":"Understand how Encryption for z\/OS secures your data and meets compliance with advanced encryption solutions on IBM zSystems.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-natural-encryption-zos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for z\/OS\u00ae"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Soluciones y servicios de transformaci\u00f3n digital de Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/682\/revisions"}],"predecessor-version":[{"id":4390,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/682\/revisions\/4390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media?parent=682"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/product?post=682"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-industry?post=682"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-topic?post=682"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-type?post=682"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-subdirectory?post=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}