IBM Sterling Secure Proxy
Helps shield your trusted network by preventing direct connectivity between external partners and internal servers.
IBM Sterling Secure Proxy - SSP
Deliver high secure B2B and MFT solution
IBM Sterling Secure Proxy (SSP) helps shield your trusted network by preventing direct connectivity between external partners and internal servers. It can secure your network and data exchanges at the network edge to enable trusted business-to-business transactions and Managed file transfer (MFT) file exchanges. As a demilitarized zone (DMZ)-based proxy, Sterling Secure Proxy uses multi-factor authentication, SSL session breaks, the closing of inbound firewall holes, protocol inspection, and other controls to ensure the security of your trusted zone.
IBM Sterling Secure Proxy is a DMZ-based application software proxy enabling secure and high-speed data movement over the internet. It provides increased perimeter security to protect the enterprise’s trusted zone, as well as authentication services to prevent unauthorized access to your business-critical internal systems. It integrates with your existing security infrastructure to meet security and audit requirements while also supporting compliance regulations and incorporating industry standards and best practices.
Enable Trusted Transactions
Sterling Secure Proxy (SSP) secures and shields your trusted network by preventing direct connectivity between external partners and your critical internal servers. Partner connections for B2B transactions and MFT file exchanges are intercepted at the edge and following authorization are transparently redirected to trusted connections within your enterprise.
Enable Speed and Transparency
IBM Secure Proxy offers a bridging capability for a high-speed protocol to the mainframe to support the IBM Connect: Direct High-Speed add-on option (HSAO). HSAO enables speedy and efficient transfers of large files over long distances. This also brings transparency to your migration projects.
Governance and Compliance
A fully IBM Watson Supply Chain Data Sheet integrated interface to external ID stores eliminates the need for duplicate stores and local accounts, providing a single source for user and partner credentials. Interfaces to HSMs support the use of these devices for key storage.
Multiple Secure Proxy engines may be deployed in the DMZ for traffic separation, load balancing, and capacity management. A Configuration Manager console is provided for the creation and management of all proxy configuration objects and for managing the proxy engine(s) in the DMZ. The configuration is always performed inside the trusted zone to ensure the protection of configuration and management activities.
IBM Sterling Secure Proxy - SSP Services Includes:
Sterling Secure Proxy (SSP) Service - FAQ's
2. Disable utilities that allow remote users to access the server’s internal processes.
3. Use packet filtering and firewalls.
4. Control CGI scripts.