{"id":688,"date":"2023-07-25T10:36:49","date_gmt":"2023-07-25T14:36:49","guid":{"rendered":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"},"modified":"2025-12-20T18:36:46","modified_gmt":"2025-12-20T22:36:46","slug":"adabas-encryption-linux","status":"publish","type":"resource","link":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-encryption-linux\/","title":{"rendered":"Cifrado Adabas para Linux"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-apply-industry-leading-security-on-premises-and-in-the-cloud\">Aplique la seguridad l\u00edder del sector en las instalaciones y en la nube<\/h2>\n\n\n\n<p>Las crecientes demandas regulatorias, combinadas con la necesidad de medidas de ciberseguridad cada vez m\u00e1s fuertes hacen que sea cr\u00edtico para usted proteger su valiosa informaci\u00f3n contra el acceso no autorizado. Adabas Encryption para Linux le ayuda a proteger sus datos y cumplir con las crecientes regulaciones de seguridad. Proteja los datos en reposo y los datos en vuelo con el cifrado l\u00edder en la industria que funciona dondequiera que se implemente su sistema. Con Adabas Encryption para Linux, puede ejecutar sus aplicaciones de confianza pr\u00e1cticamente en cualquier lugar, y asegurar sus datos Adabas en todas partes. Aproveche la escalabilidad y capacidad de respuesta de las m\u00e1quinas virtuales y contenedores, y ejecute en su elecci\u00f3n de proveedor de nube, mientras protege sus datos con est\u00e1ndares de cifrado de vanguardia.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-complete-protection\">Protecci\u00f3n total<\/h2>\n\n\n\n<p>Funcionando en Linux, puede proteger su <a href=\"https:\/\/www.softwareag.com\/es\/adabas-natural\/\">Adabas<\/a> datos en reposo, en vuelo y en uso sin requerir ning\u00fan cambio en la aplicaci\u00f3n o arriesgar su rendimiento fiable. Adabas Encryption para Linux asegura los datos en vuelo con acceso directo TCP\/IP basado en TLS y OpenSSL a su n\u00facleo Adabas. Tambi\u00e9n protege los datos sensibles en reposo con una soluci\u00f3n basada en software que soporta el NIST Advanced Encryption Standards (AES) a nivel de base de datos. Esto asegura que incluso si su contenedor de almacenamiento de datos Adabas es copiado por usuarios no autorizados, sus datos permanecer\u00e1n encriptados y protegidos. Con el control de acceso basado en roles que se encuentra en Adabas para Linux, tambi\u00e9n puede proteger sus datos en uso, mediante el control de perfiles de usuario y derechos de acceso. Adabas Encryption incluye un almac\u00e9n de claves integrado, listo para iniciar, que proporciona una f\u00e1cil administraci\u00f3n de claves de cifrado y acceso, al tiempo que permite el archivo seguro de datos a largo plazo.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-benefits\">Principales ventajas<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cumplir de forma eficaz y completa la normativa sobre protecci\u00f3n de datos en constante evoluci\u00f3n<\/li>\n\n\n\n<li>Proteja sus datos contra el acceso de agentes no autorizados<\/li>\n\n\n\n<li>Aproveche el cifrado avanzado con claves AES de 128 y 256 bits est\u00e1ndar del sector<\/li>\n\n\n\n<li>Gestione f\u00e1cilmente el cifrado y las claves de acceso para la administraci\u00f3n<\/li>\n\n\n\n<li>Proteja los datos en reposo y en vuelo sin cambiar las aplicaciones existentes<\/li>\n\n\n\n<li>Personalice la protecci\u00f3n y cifre s\u00f3lo determinadas bases de datos<\/li>\n\n\n\n<li>Soluci\u00f3n lista para usar y compatible con los proveedores que no requiere nuevas instalaciones<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/softwareag.scene7.com\/is\/image\/softwareagprod\/ds-adabas-encryption-for-linux-graphic-1?$PNGwithAlpha$&amp;wid=1260&amp;dpr=off\" alt=\"\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-features\">Caracter\u00edsticas<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-encrypt-on-linux-everywhere\">Cifrar en Linux en todas partes<\/h5>\n\n\n\n<p>Aplique la misma soluci\u00f3n de cifrado avanzado a m\u00e1quinas virtuales y contenedores, que se ejecuten en las instalaciones o en la nube.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-simplify-enterprise-key-management\">Simplifique la gesti\u00f3n de claves empresariales<\/h5>\n\n\n\n<p>Agilice la administraci\u00f3n del cifrado para generar, almacenar y gestionar claves con un almac\u00e9n de claves en el sistema de gesti\u00f3n de archivos.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-maintain-access-for-authorized-utilities\">Mantener el acceso de los servicios p\u00fablicos autorizados<\/h5>\n\n\n\n<p>Entregue datos sin interrupciones a programas, usuarios y servicios autorizados. Todas las utilidades Adabas pueden trabajar con datos encriptados sin requerir cambios.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-modernize-securely\">Modernizar con seguridad<\/h5>\n\n\n\n<p>Elija la implantaci\u00f3n de Linux que mejor se adapte a sus necesidades y cambie la infraestructura inform\u00e1tica sin comprometer la seguridad.<br><\/p>\n\n\n\n<div class=\"wp-block-group alignwide sag-cards-row sag-cards-row-icons has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-top-color:var(--wp--preset--color--gray);border-top-width:2px;border-right-style:none;border-right-width:0px;border-bottom-style:none;border-bottom-width:0px;border-left-style:none;border-left-width:0px;margin-top:var(--wp--preset--spacing--xl);padding-bottom:var(--wp--preset--spacing--l)\">\n<h2 class=\"wp-block-heading alignwide\" id=\"h-you-may-also-like\" style=\"margin-top:48px;margin-bottom:var(--wp--preset--spacing--m)\">Tambi\u00e9n te puede interesar:<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f7d19e04 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--m)\">\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/lightbulb-icon.png\" alt=\"icono de bombilla\" class=\"wp-image-186\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-stay-connected\">Mantente conectado<\/h4>\n\n\n\n<p class=\"translation-block\">\u00danase a la comunidad y siga las \u00faltimas noticias sobre Adabas &amp; Natural en la comunidad tecnol\u00f3gica de <span class=\"nowrap\">Software AG<\/span>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/tag\/Adabas-Natural\">Visite nuestra comunidad tecnol\u00f3gica<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/laptop-icon.png\" alt=\"icono de port\u00e1til\" class=\"wp-image-188\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-see-what-s-new\">Novedades<\/h4>\n\n\n\n<p class=\"translation-block\">Descubra las \u00faltimas innovaciones, vea seminarios web y compruebe c\u00f3mo <span class=\"nowrap\">Adabas &amp; Natural<\/span> est\u00e1 preparado para 2050 y m\u00e1s all\u00e1.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/adabas-natural\/\">Saber m\u00e1s<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"\/app\/uploads\/2025\/08\/globe-icon.png\" alt=\"icono del globo\" class=\"wp-image-189\" style=\"width:42px\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-international-user-groups\">Grupos internacionales de usuarios<\/h4>\n\n\n\n<p>\u00danase a uno de nuestros grupos de usuarios para establecer contactos con colegas de todo el mundo.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:0\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/developer\/usergroup\/\">Encuentra un grupo de usuarios<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-left-aligned pre-footer-cta has-purple-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--l);padding-top:var(--wp--preset--spacing--xxl);padding-bottom:var(--wp--preset--spacing--xxl)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignfull has-text-align-left has-grande-font-size has-white-color has-text-color has-link-color has-large-font-size wp-elements-b8d6f6f931fae20ac61d525c023df76b\" id=\"h-want-to-make-your-core-applications-future-ready\">\u00bfQuieres que tus aplicaciones de misi\u00f3n cr\u00edtica est\u00e9n preparadas para el futuro?<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e04203c2fbc13876bd23d5f3081c4d1d translation-block\">Build on your legacy. Accelerate development in a modern DevOps environment. Modernize your <span class=\"nowrap\">Adabas &amp; Natural<\/span> applications to save costs and embrace hybrid cloud.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-dark-bg-primary is-style-dark-bg-primary--4\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.softwareag.com\/es\/contact\/\">Habla con nuestros expertos<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-dark-bg-transparent is-style-dark-bg-transparent--5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcommunity.softwareag.com\/t\/adabas-natural-community-edition-for-docker-download\/235228\">Pruebas gratuitas<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignwide is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-no-border is-style-no-border--6\"><a class=\"wp-block-button__link has-white-color has-text-color has-link-color has-text-align-left wp-element-button\" href=\"https:\/\/discover.softwareag.com\/free-it-health-checks.html\">Solicita un chequeo gratuito del estado de tu TI<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Ejecute sus aplicaciones de confianza pr\u00e1cticamente en cualquier lugar, y asegure sus datos Adabas en todas partes con la protecci\u00f3n completa entregada por Adabas Encryption para Linux.<\/p>","protected":false},"featured_media":683,"template":"","product":[66],"resource-industry":[],"resource-topic":[76,78],"resource-type":[31],"resource-subdirectory":[64],"class_list":["post-688","resource","type-resource","status-publish","has-post-thumbnail","hentry","product-adabas-natural","resource-topic-linux-cloud","resource-topic-security","resource-type-datasheet","resource-subdirectory-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption for Linux: Protect Your Data Today | Software AG<\/title>\n<meta name=\"description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta property=\"og:description\" content=\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-encryption-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-20T22:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adabas Encryption for Linux\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"url\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\",\"name\":\"Encryption for Linux: Protect Your Data Today | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"datePublished\":\"2023-07-25T14:36:49+00:00\",\"dateModified\":\"2025-12-20T22:36:46+00:00\",\"description\":\"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.softwareag.com\/br\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Adabas Encryption for Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption for Linux: Protect Your Data Today | Software AG","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-encryption-linux\/","og_locale":"es_ES","og_type":"article","og_title":"Adabas Encryption for Linux","og_description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","og_url":"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/adabas-encryption-linux\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_modified_time":"2025-12-20T22:36:46+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Adabas Encryption for Linux","twitter_site":"@softwareag","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","url":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/","name":"Encryption for Linux: Protect Your Data Today | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","datePublished":"2023-07-25T14:36:49+00:00","dateModified":"2025-12-20T22:36:46+00:00","description":"Ensure data security with Encryption for Linux. Protect your information against unauthorized access and comply with regulations.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/ds-an-03.svg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/resources\/adabas-natural\/adabas-encryption-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.softwareag.com\/br\/resources\/"},{"@type":"ListItem","position":3,"name":"Adabas Encryption for Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Soluciones y servicios de transformaci\u00f3n digital de Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":6,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/688\/revisions"}],"predecessor-version":[{"id":4382,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource\/688\/revisions\/4382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media\/683"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media?parent=688"}],"wp:term":[{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/product?post=688"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-industry?post=688"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-topic?post=688"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-type?post=688"},{"taxonomy":"resource-subdirectory","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/resource-subdirectory?post=688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}