other-pagebg
IBM Sterling Secure Proxy
IBM Sterling Secure Proxy
IBM Sterling Secure Proxy provides a secure gateway for transmitting sensitive data between business partners. It employs encryption and secure protocols to protect the confidentiality and integrity of data during transit. It supports the conversion of different communication protocols, enabling interoperability between partners with varying data transmission requirements.

Sterling Secure Proxy serves as a DMZ-based application software proxy, facilitating secure and high-speed data movement over the internet. This solution enhances perimeter security, safeguarding the enterprise's trusted zone, and provides authentication services to thwart unauthorized access to internal systems. By integrating with existing security infrastructure, it meets security and audit requirements, aligns with compliance regulations, and incorporates industry standards and best practices.

Key Features:
Defense-in-Depth Security:

Utilizes a defense-in-depth strategy for advanced edge security.
Implements DMZ-based authentication, SSL session breaks, and SSL termination at the edge.
Prevents direct access to trusted systems across various file transfer protocols, regardless of file type or payload size.
Proactively blocks malicious users attempting to access trusted systems.
Configuration Management:

Manages configuration in the trusted zone.
No data is stored on physical drives in the DMZ, ensuring the security of vital business files against unauthorized access.
Trusted Transactions:

Secures and shields the trusted network by preventing direct connectivity between external partners and critical internal servers.
Intercepts partner connections for B2B transactions and MFT file exchanges at the edge, redirecting them transparently to trusted connections within the enterprise.
High-Speed Protocol Support:

Offers a bridging capability for high-speed protocols, supporting the IBM Sterling Connect:Direct High-Speed add-on option (HSAO).
Enables efficient transfers of large files over long distances.
Facilitates migrations from third-party gateway solutions with dynamic routing capability, minimizing impact on customers and partners.
Operational Management:

Allows deployment of multiple Secure Proxy engines in the DMZ for traffic separation, load balancing, and capacity management.
Provides a Configuration Manager console for creation and management of all proxy configuration objects.
Supports administration through RESTful APIs, allowing automation of configuration objects, engine management, and import/export of settings.
Governance and Compliance:

Implements multiple levels of governance for compliance with enterprise security policies.
Logs security and configuration changes comprehensively for routine reporting and detailed audits.
Enables monitoring and alerting on the operational health of proxy engines and adapters through queued events.
Integrates with external ID stores, eliminating the need for duplicate stores and local accounts.
Supports Hardware Security Modules (HSMs) for key storage.