IBM Sterling Secure Proxy

Internet is risky for file transfer

IBM Secure Proxy is a Demilitarized Zone (DMZ) application proxy that protects file transfers from the public Internet , imposing strict controls such as business partner authorization, multifactor authentication, and session interruption before the transfer get in the zone of trust.
IBM Sterling Secure Proxy provides you with a completely secure B2B file transfer.

Keep files in good hands, with features that include:

Application proxy.

  • Resident in the demilitarized zone (DMZ).

  • Supports IBM Sterling Connect: Direct servers, IBM Sterling Connect Express and IBM SterlingB2B Integrator.

  • Supports multiple DMZ environments.

  • Supports FTP, FTPS, HTTP, HTTPS, SSH / SFTP, PeSIT and Sterling Connect: Direct protocols.

Firewall navigation practices.

  • Prevents entry holes in the firewall.

  • Minimize key destinations in the demilitarized zone by ensuring that files, user credentials and data are not stored in the demilitarized zone.

  • Establish sessions from trusted areas to areas of lower confidence.

  • Enforces internal and external security policies.

Perimeter security.

  • Prevents direct communications between internal and external sessions by establishing secure  session interruptions in the demilitarized zone via SSL or TLS.

  • Inspect sensitive control information and protocol, enabling configurable error handling for violations.

  • Session limits and data encryption protect against denial of service attacks.

Authentication services.

  • The customizable login portal provides self-service password management for business  partners.

  • Supports single sign-on and integrates with existing security infrastructure, including Active  Directory and Tivoli user databases.

  • Multifactor authentication imposes severe controls and validation of business partner identity in  DMZ before the information passes into the trusted zone.

  • Authentication options include the IP address, user ID and password, digital certificates, SSH  Keys, RSA SecurID.

Clustering.

  • A central configuration manager directs configuration rules to several engines running in the  demilitarized zone, facilitating the expansion.

  • Clustering for high availability and load balancing provides operational continuity and increased  throughput.

For a high availability deployment, you can install more than one Sterling Secure Proxy node. In the following example, two Sterling Secure Proxy nodes redirect requests to two B2B Advanced Communications nodes.


 

Contact B2B Solutions if you have questions or need more information about IBM Sterling Secure Proxy.

We will be happy to help you.