SlideShare a Scribd company logo
1 of 3
Download to read offline
IBM Software
IBM®
Sterling
Secure Proxy
Provide robust, auditable edge security for your
multi-enterprise data exchanges
Enable trusted transactions
As global business becomes more and more inter-connected, exchange
of information across organizational boundaries is expanding rapidly.
IBM® Sterling Secure Proxy secures and shields your trusted network
by preventing direct connectivity between external partners and
internal servers. Partner connections for B2B transactions and file
exchanges are intercepted at the edge and once authorized are
transparently redirected to trusted connections within your enterprise.
Secure your network at the edge
Sterling Secure Proxy provides advanced edge security by enabling a
defence-in-depth strategy. DMZ-based authentication, session breaks,
and SSL termination at the edge prevent external parties from having
direct access to trusted systems, regardless of the type or size of payload
across a wide range of file transfer communications protocols.
Configuration is managed in the trusted zone and no data is stored
unencrypted in the DMZ, so your vital business files are secured from
external parties.
Governance and compliance
Multiple levels of governance enable compliance with enterprise
security policy. Comprehensive logging of security and configuration
changes support routine reporting as well as detailed audits. Queued
events enable monitoring and alerting for security failures and
operational health of the proxy engine and for configuration changes.
A fully integrated interface to external ID stores (such as LDAP)
eliminates the need for duplicate stores, providing a single source for
user and partner credentials. Interfaces to hardware security modules
(HSMs) support use of these devices for key storage.
Benefits
•	 Enable trusted Business-to-Business
transactions and file exchanges
•	 Secure your network at the edge,
protecting your data, and internal systems
•	 Comply with security policy and more
easily pass security audits
IBM Software
2
Capability Description
Application proxy • Resides in the demilitarized zone (DMZ)
• Supports IBM® Sterling Connect:Direct, IBM® Sterling B2B Integrator, IBM® Sterling File Gateway, 	
and IBM® Sterling Connect:Express
• Compatible with layered- or multiple-DMZ environments
• Supports FTP, FTPS, HTTP, HTTPS, AS2, SSH/SFTP, PeSIT and Sterling Connect:Direct protocols
• Includes a FIPS 140-2 compliant data encryption module with the option to force “strict 	
FIPS mode” communications
Firewall navigation
best practices
• Prevents inbound holes in the firewall
• Minimizes rich targets in the DMZ by ensuring that files, user credentials and data are never stored 	
on physical drives in the DMZ
• Establishes sessions from more-trusted to less-trusted zones
• Enforces internal and external security policies
Perimeter security • Prevents direct communications between external and internal sessions by establishing secure 	
session breaks in the DMZ using SSL or TLS connections
• Inspects protocol and sensitive control information and supports configurable error handling 	
if violations are detected
• Session limits and data encryption guard against denial-of-service attacks
Authentication services • Customizable logon portal provides self-service password management for trading partners
• Supports single sign-on and integration with existing security infrastructure, including Active Directory 	
and Tivoli user databases
• Multifactor authentication enforces tight controls and validation of trading partner identity in the DMZ 	
before internal sessions are established to the trusted zone
• Authentication options include IP address, user ID and password, digital certificates, SSH Keys, RSA SecurID
Clustering • One central configuration manager pushes out configuration rules to multiple engines running in the 	
DMZ facilitating painless scalability
• High-availability and load-balanced clustered environments are supported ensuring business continuity 	
and optimal performance
Operational management
Multiple Sterling Secure Proxy engines may be deployed in
the DMZ for traffic separation, load balancing, or capacity
management. A Configuration Manager console is provided
for creation and management of all proxy configuration
objects and for managing the proxy engine(s) in the DMZ.
Administration is simplified through the ability to load a
single configuration set onto multiple proxy engines.
In addition, a full set of REST API’s supports full
automation of all configuration objects, starting and stopping
the engine(s), and importing or exporting configuration
sets. Configuration is always performed inside the trusted
zone to ensure the protection of configuration and
management activities.
Please Recycle
© Copyright IBM Corporation 2014
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
November 2014
All Rights Reserved
IBM, the IBM logo, ibm.com and Sterling Commerce are trademarks or registered
trademarks of International Business Machines Corporation in the United States,
other countries, or both. If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark symbol (® or ™), these
symbols indicate U.S. registered or common law trademarks owned by IBM at the
time this information was published. Such trademarks may also be registered or
common law trademarks in other countries. A current list of IBM trademarks is
available on the web at “Copyright and trademark information” at www.ibm.com/
legal/copytrade.shtml.
The information contained in this publication is provided for informational purposes
only. While efforts were made to verify the completeness and accuracy of the
information contained in this publication, it is provided AS IS without warranty of
any kind, express or implied. In addition, this information is based on IBM’s current
product plans and strategy, which are subject to change by IBM without notice. IBM
shall not be responsible for any damages arising out of the use of, or otherwise
related to, this publication or any other materials. Nothing contained in this
publication is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
References in this publication to IBM products, programs, or services do not imply
that they will be available in all countries in which IBM operates. Product release
dates and/or capabilities referenced in this presentation may change at any time at
IBM’s sole discretion based on market opportunities or other factors, and are not
intended to be a commitment to future product or feature availability in any way.
Nothing contained in these materials is intended to, nor shall have the effect of,
stating or implying that any activities undertaken by you will result in any specific
sales, revenue growth, savings or other results.
ZZD03039USEN-02

More Related Content

What's hot

System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from SymantecArrow ECS UK
 
Firewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicaçõesFirewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicaçõesCYLK IT Solutions
 
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.John Wallix
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Marco Di Martino
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Precisely
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationHelpSystems
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glassPer Larsen
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?HelpSystems
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next levelPer Larsen
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
The 3CX VoIP PBX phone System
The 3CX VoIP PBX phone SystemThe 3CX VoIP PBX phone System
The 3CX VoIP PBX phone Systembkreeger
 

What's hot (20)

QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
Firewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicaçõesFirewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicações
 
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glass
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
The 3CX VoIP PBX phone System
The 3CX VoIP PBX phone SystemThe 3CX VoIP PBX phone System
The 3CX VoIP PBX phone System
 

Similar to IBM Sterling Secure Proxy

IBM Sterling Connect: Direct
IBM Sterling Connect: DirectIBM Sterling Connect: Direct
IBM Sterling Connect: DirectLightwell
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content PreviewzOSCommserver
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualsflynn073
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualsflynn073
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017panagenda
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupSocialBiz UserGroup
 
IBM Connections Adminblast - Connect17 (DEV 1268)
IBM Connections Adminblast - Connect17 (DEV 1268)IBM Connections Adminblast - Connect17 (DEV 1268)
IBM Connections Adminblast - Connect17 (DEV 1268)Nico Meisenzahl
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...SocialBiz UserGroup
 
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOpsSHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOpsRob Convery
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsIBM India Smarter Computing
 
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...SocialBiz UserGroup
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...panagenda
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloudSudheer Y
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 

Similar to IBM Sterling Secure Proxy (20)

IBM Sterling Connect: Direct
IBM Sterling Connect: DirectIBM Sterling Connect: Direct
IBM Sterling Connect: Direct
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
IBM Connections Adminblast - Connect17 (DEV 1268)
IBM Connections Adminblast - Connect17 (DEV 1268)IBM Connections Adminblast - Connect17 (DEV 1268)
IBM Connections Adminblast - Connect17 (DEV 1268)
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOpsSHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
 
BLADEHarmony Manager
BLADEHarmony ManagerBLADEHarmony Manager
BLADEHarmony Manager
 
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
Security PFE
Security PFESecurity PFE
Security PFE
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 

More from Lightwell

Lightwell at a Glance
Lightwell at a GlanceLightwell at a Glance
Lightwell at a GlanceLightwell
 
Lightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell
 
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Lightwell
 
KeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyKeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyLightwell
 
CSX Transportation IBM Case Study
CSX Transportation IBM Case StudyCSX Transportation IBM Case Study
CSX Transportation IBM Case StudyLightwell
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement ManagerLightwell
 
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyHirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyLightwell
 
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationLightwell
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyLightwell
 
Bonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyBonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyLightwell
 
IBM Distributors Order Management
IBM Distributors Order ManagementIBM Distributors Order Management
IBM Distributors Order ManagementLightwell
 
B2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicB2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicLightwell
 
Protecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomProtecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomLightwell
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the FutureLightwell
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewLightwell
 
IBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewIBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewLightwell
 
IBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesIBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesLightwell
 
IBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewIBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewLightwell
 
Lightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell
 
Lightwell: Company Overview
Lightwell: Company OverviewLightwell: Company Overview
Lightwell: Company OverviewLightwell
 

More from Lightwell (20)

Lightwell at a Glance
Lightwell at a GlanceLightwell at a Glance
Lightwell at a Glance
 
Lightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution Guide
 
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
 
KeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyKeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case Study
 
CSX Transportation IBM Case Study
CSX Transportation IBM Case StudyCSX Transportation IBM Case Study
CSX Transportation IBM Case Study
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement Manager
 
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyHirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
 
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B Integration
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
 
Bonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyBonnie Plants IBM Case Study
Bonnie Plants IBM Case Study
 
IBM Distributors Order Management
IBM Distributors Order ManagementIBM Distributors Order Management
IBM Distributors Order Management
 
B2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicB2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - Infographic
 
Protecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomProtecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in Telecom
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the Future
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions Overview
 
IBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewIBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions Overview
 
IBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesIBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud Services
 
IBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewIBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines Overview
 
Lightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: Detail
 
Lightwell: Company Overview
Lightwell: Company OverviewLightwell: Company Overview
Lightwell: Company Overview
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

IBM Sterling Secure Proxy

  • 1. IBM Software IBM® Sterling Secure Proxy Provide robust, auditable edge security for your multi-enterprise data exchanges Enable trusted transactions As global business becomes more and more inter-connected, exchange of information across organizational boundaries is expanding rapidly. IBM® Sterling Secure Proxy secures and shields your trusted network by preventing direct connectivity between external partners and internal servers. Partner connections for B2B transactions and file exchanges are intercepted at the edge and once authorized are transparently redirected to trusted connections within your enterprise. Secure your network at the edge Sterling Secure Proxy provides advanced edge security by enabling a defence-in-depth strategy. DMZ-based authentication, session breaks, and SSL termination at the edge prevent external parties from having direct access to trusted systems, regardless of the type or size of payload across a wide range of file transfer communications protocols. Configuration is managed in the trusted zone and no data is stored unencrypted in the DMZ, so your vital business files are secured from external parties. Governance and compliance Multiple levels of governance enable compliance with enterprise security policy. Comprehensive logging of security and configuration changes support routine reporting as well as detailed audits. Queued events enable monitoring and alerting for security failures and operational health of the proxy engine and for configuration changes. A fully integrated interface to external ID stores (such as LDAP) eliminates the need for duplicate stores, providing a single source for user and partner credentials. Interfaces to hardware security modules (HSMs) support use of these devices for key storage. Benefits • Enable trusted Business-to-Business transactions and file exchanges • Secure your network at the edge, protecting your data, and internal systems • Comply with security policy and more easily pass security audits
  • 2. IBM Software 2 Capability Description Application proxy • Resides in the demilitarized zone (DMZ) • Supports IBM® Sterling Connect:Direct, IBM® Sterling B2B Integrator, IBM® Sterling File Gateway, and IBM® Sterling Connect:Express • Compatible with layered- or multiple-DMZ environments • Supports FTP, FTPS, HTTP, HTTPS, AS2, SSH/SFTP, PeSIT and Sterling Connect:Direct protocols • Includes a FIPS 140-2 compliant data encryption module with the option to force “strict FIPS mode” communications Firewall navigation best practices • Prevents inbound holes in the firewall • Minimizes rich targets in the DMZ by ensuring that files, user credentials and data are never stored on physical drives in the DMZ • Establishes sessions from more-trusted to less-trusted zones • Enforces internal and external security policies Perimeter security • Prevents direct communications between external and internal sessions by establishing secure session breaks in the DMZ using SSL or TLS connections • Inspects protocol and sensitive control information and supports configurable error handling if violations are detected • Session limits and data encryption guard against denial-of-service attacks Authentication services • Customizable logon portal provides self-service password management for trading partners • Supports single sign-on and integration with existing security infrastructure, including Active Directory and Tivoli user databases • Multifactor authentication enforces tight controls and validation of trading partner identity in the DMZ before internal sessions are established to the trusted zone • Authentication options include IP address, user ID and password, digital certificates, SSH Keys, RSA SecurID Clustering • One central configuration manager pushes out configuration rules to multiple engines running in the DMZ facilitating painless scalability • High-availability and load-balanced clustered environments are supported ensuring business continuity and optimal performance Operational management Multiple Sterling Secure Proxy engines may be deployed in the DMZ for traffic separation, load balancing, or capacity management. A Configuration Manager console is provided for creation and management of all proxy configuration objects and for managing the proxy engine(s) in the DMZ. Administration is simplified through the ability to load a single configuration set onto multiple proxy engines. In addition, a full set of REST API’s supports full automation of all configuration objects, starting and stopping the engine(s), and importing or exporting configuration sets. Configuration is always performed inside the trusted zone to ensure the protection of configuration and management activities.
  • 3. Please Recycle © Copyright IBM Corporation 2014 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America November 2014 All Rights Reserved IBM, the IBM logo, ibm.com and Sterling Commerce are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/ legal/copytrade.shtml. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. ZZD03039USEN-02