IBM Sterling Secure Proxy

helps shield your trusted network by preventing direct connectivity between external partners and internal servers.

IBM, Sterling, Secure Proxy, IBM Sterling Secure Proxy, Pragma edge, Pragmaedge, Sterling Secure Proxy,

IBM Sterling Secure Proxy - Overview

IBM Sterling Secure Proxy helps shield your trusted network by preventing direct connectivity between external partners and internal servers. It can secure your network and data exchanges at the network edge to enable trusted business-to-business transactions and Managed file transfer (MFT) file exchanges. As a demilitarized zone (DMZ)-based proxy, Secure Proxy uses multi-factor authentication, SSL session breaks, the closing of inbound firewall holes, protocol inspection and other controls to ensure the security of your trusted zone.

Enable Trusted Transactions, IBM, Sterling, Secure Proxy, IBM Sterling Secure Proxy, Pragma edge, Pragmaedge, Sterling Secure Proxy,

Enable Trusted Transactions

Secure Proxy secures and shields your trusted network by preventing direct connectivity between external partners and your critical internal servers. Partner connections for B2B transactions and MFT file exchanges are intercepted at the edge and following authorization are transparently redirected to trusted connections within your enterprise. ​

Enable Speed and Transparency

Secure Proxy offers a bridging capability for a high-speed protocol to the mainframe to support the IBM Connect: Direct High-Speed add-on option (HSAO). HSAO enables speedy and efficient transfers of large files over long distances. This also brings transparency to your migration projects.

Secure Proxy Speed, IBM, Sterling, Secure Proxy, IBM Sterling Secure Proxy, Pragma edge, Pragmaedge, Sterling Secure Proxy,
Governance And Compliance, IBM, Sterling, Secure Proxy, IBM Sterling Secure Proxy, Pragma edge, Pragmaedge, Sterling Secure Proxy,

Governance and Compliance

A fully IBM Watson Supply Chain Data Sheet integrated interface to external ID stores eliminates the need for duplicate stores and local accounts, providing a single source for user and partner credentials. Interfaces to HSMs support the use of these devices for key storage.

Operational Management

Multiple Secure Proxy engines may be deployed in the DMZ for traffic separation, load balancing, and capacity management. A Configuration Manager console is provided for the creation and management of all proxy configuration objects and for managing the proxy engine(s) in the DMZ. The configuration is always performed inside the trusted zone to ensure the protection of configuration and management activities.

Operational Management, IBM, Sterling, Secure Proxy, IBM Sterling Secure Proxy, Pragma edge, Pragmaedge, Sterling Secure Proxy,

Secure Proxy Services Includes:

Connect With Us

For any problems or questions, feel free to reach out to us by filling up the form

Thank You!

Sign up request has been successfully sent. We will contact you very soon!

Sign up for Free Trail

Community manager solution extends IBM Sterling B2B Integrator to deliver next-generation B2B and File Transfer capabilities that meet the growing demands of the customer.​

Thank You!

Your Article submission request has been successfully sent. We will review your article & contact you very soon!

Thanks for submitting your request

Thank You!

Thanks for signing up! We look forward to sharing resources and updates with you.

Continue to view our resources below.

Subscribe to our newsletter

Elevate your approach to technology with expert-authored blogs, articles, and industry perspectives.

Please Join us
On April 21 2021, 11 AM CT

Pragma edge, Sterling integrator, Webinar,