Business automation Sterling Sterling Secure File Transfer Sterling Secure Proxy IBM Sterling Secure Proxy
Advanced edge security for your multi-enterprise data exchanges
A woman working on a desktop computer
Secure partner access to your internal servers

IBM Sterling Secure Proxy helps shield your trusted network by preventing direct connectivity between external partners and internal servers. It can secure your network and data exchanges at the network edge to enable trusted business-to-business transactions and managed file transfer (MFT) file exchanges. As a demilitarized zone (DMZ)-based proxy, Secure Proxy uses multifactor authentication, SSL session breaks, closing of inbound firewall holes, protocol inspection and other controls to ensure the security of your trusted zone.

Benefits of IBM Sterling Secure Proxy
Data protection

Provides firewall navigation best practices to help ensure perimeter security for enhanced protection of your data and trusted zone.

Full authentication services

Offers multifactor authentication before connection to backend systems, for tighter controls and validation.

Advanced proxy features

Includes proxy support and functions to improve security of edge-based file exchanges.

Dynamic routing

Provides advanced routing to simplify infrastructure changes, saving time and reducing risk during migrations.

Certified containers

IBM Sterling Secure Proxy certified containers are enterprise-grade, security-hardened product editions with integrated common software services for consistent deployment lifecycle management. The scalable containers include easy iinstallation and configuration options, and upgrade and roll-back management.

Learn about IBM Certified Containers

Demilitarized zone application proxy

Provides a secure intermediary, a standalone server, as the demilitarized zone (DMZ). This is a sterile holding area until the partner is successfully validated. Then a separate session is established from the DMZ to the trusted zone.

Firewall navigation best practices

Minimizes rich targets in the DMZ by ensuring that files, user credentials and data are never stored on physical drives in the DMZ. Removes requirement for inbound holes in the firewall.

Perimeter security

Prevents direct communications between external and internal sessions by establishing secure session breaks in the DMZ using SSL or TLS encryption.

Multifactor authentication

Provides authentication options, including IP address, user ID and password, digital certificates, SSH keys and RSA SecurID.

Resources IBM Data Exchange Maturity Assessment

Take the IBM Data Exchange Maturity Assessment to see how your company can lower costs and improve efficiency.

White paper: IBM Certified Containers for Sterling B2B Collaboration

Gain operational efficiencies with IBM Certified Containers.

White paper: Four keys to effectively monitor and control secure file transfer

Learn how IBM can help enable your company to meet the demands of business today and tomorrow.

Analyst firm Ovum: IBM and MFT

Ovum shares details about how IBM is modernizing MFT solutions for evolving business IT requirements.

Smart paper: Seven key drivers for modernizing your B2B architecture

Keeping your company’s B2B architecture properly updated is crucial in any industry. Here’s how.

The IT architect’s guide to managed file transfer consolidation

Learn the key characteristics needed to modernize legacy file transfer

Implement a zero trust strategy for your file transfers

Learn how a zero trust approach can help protect your data and reduce the possibility for ransomware or malware to travel laterally.

Safeguard your B2B transactions and file exchanges

Learn 3 steps to help protect your B2B transactions and file exchanges from security threats.

Audiogram: Enable secure and high-speed data movement

With rapid rise in the volume of file transfers, you need advanced edge security to protect your multi-enterprise data exchanges.

Infographic: Failure is not an option for your file transfers

Research shows you cannot count on FTP to deliver your files. Discover how to protect your business.

Our information security team is a big fan of the validation and authentication capabilities in Secure Proxy. Brenda Gillespie Senior Systems Analyst Western Union Read the client story
Expert resources to help you succeed
Product documentation

Find answers quickly in IBM product documentation.

Expert blog

Gain new perspectives and get expert guidance.


Get technical tips and insights from others who use this product.