Key capabilities

Demilitarized Zone (DMZ) Application Proxy

Provides a secure intermediary, a stand alone server, as the DMZ. This is a sterile holding area until the partner is successfully validated. Then a separate session is established from the DMZ to the trusted zone.

Firewall navigation best practices

Minimize rich targets in the DMZ by ensuring that files, user credentials and data are never stored on physical drives in the DMZ. Also, removes requirement for inbound holes in the firewall.

Perimeter security

Prevents direct communications between external and internal sessions by establishing secure session breaks in the DMZ using SSL or TLS encryption.

Multi-factor authentication

Authentication options include IP address, user ID and password, digital certificates, SSH Keys, and RSA SecureID.

Download the IBM Sterling Secure Proxy data sheet

Read the solution brief

You may also be interested in

IBM Sterling File Gateway

Managing "edge" based file transfers with a centralized gateway

Learn more

IBM Sterling Connect:Direct

Reliable and secure point-to-point transfer

Learn more

IBM Sterling Control Center

IBM Sterling Control Center tracks the critical events across your B2B and managed file transfer (MFT) infrastructure for improved operations, customer service and B2B governance.

Learn more

IBM Sterling B2B Integrator

A single, scalable and secure B2B integration platform

Learn more

Buy now and get started