Brief Introduction To IBM Sterling Secure Proxy

IBM Sterling Secure Proxy is a demilitarized zone (DMZ)-based application proxy that safe guards the organizations file transfers from the public Internet, by implementing highly secured protocols that include trading-partner authorization, multiple-factor authentication and session-break-all earlier than the transmission ever comes into the trusted zone. This presents a high level of data security between external connections and the organizations internal network.
IBM Sterling Secure Proxy helps secure and safeguards Organizations trusted network by put a stop to straight connectivity between external partners and internal servers. It can protect Organizations network and data interactions at the network edge to facilitate trusted business-to-business transactions and MFT file exchanges. The use of SSP is a excellent practice essential to guard against unauthorized access reducing data vulnerability within B2B integration environment. Several organizations insist for compliance with regulatory policies to safe guard their data and SSP plays an important part of insuring these requirements are met.
IBM Sterling Proxy Example

Sterling Secure Proxy features and benefits
  • Reduces rich objectives in the demilitarized zone by making certain that files, user credentials and data are not stored in the demilitarized zone.
  • Implements internal and external security policies and sets up sessions from more-trusted to less-trusted zones.
  • Avoids straight communications between external and internal sessions by establishing secure session breaks in the demilitarized zone using SSL or TLS.
  • Scrutinizes protocol and sensitive control information, facilitate configurable error handling for violations.
  • Session limits and data encryption guard against Denial-of-Service attacks.
  • Personalized log-on portal offers self-service password management for trading partners.
  • Provides single sign-on and incorporates with existing security infrastructure, including Active Directory and Tivoli user databases.
  • Multiple factor authentication with alternatives that comprises of IP address, user ID and password, digital certificates, SSH Keys and RSA SecurIDs, implements highly secured protocols for trading partner identity in the DMZ before information is passed to the trusted zone.
  • One central configuration manager provides the configuration rules to multiple engines running in the DMZ, making it easy to scale, supports collection for high availability and load balancing to offer operational continuity and enhanced performance.

Sterling Secure Proxy 7197599486278462155

Post a Comment


Home item

Blog Archive

Popular Posts

Random Posts

Flickr Photo