<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=132419227312991&amp;ev=PageView&amp;noscript=1">
(614) 436-4040

IBM Sterling Secure Proxy

Sterling Secure Proxy is a demilitarized zone (DMZ)-based application proxy that protects your file transfers from the public Internet, by enforcing tight controls including trading-partner authorization, multi-factor authentication and session break, before the transfer ever enters your trusted zone

  • SSL session breaks and multi-factor authentication – Help guard against unauthorized access and reduce data vulnerability to protect your brand
  • Leverage the Internet – Lower your file transfer costs and grow your file transfer community while securing the data and access to your trusted zone
  • Firewall navigation best practices – Increases perimeter security for your file transfer infrastructure to comply with regulatory policies and pass tougher security audits
  • Self-service logon portal – Provides self-service password management for trading partners reducing the dependency on IT staff
  • Sterling Secure Proxy is available as licensed on premise software
New Call-to-Action

REMEDI offers some of the most senior MFT professionals experienced with Sterling Secure Proxy. As an IBM Premier Business Partner and software reseller, we have extensive experience with the product and our services are tailored a number of ways to fit client needs. Whether it is for original software installation, or for upgrades, our MFT professionals assist clients with Sterling Control Center installation, configuration and deployment.

Learn more about IBM File Transfer and Messaging Products.

IBM Sterling Secure Proxy Product Description

Application Proxy

  • Resides in the demilitarized zone (DMZ)
  • Supports IBM® Sterling Connect:Direct®, IBM® Sterling Connect Express® and IBM® Sterling B2B Integrator servers
  • Support for multiple DMZ environments
  • Supports FTP, FTPS, HTTP, HTTPS, SSH/SFTP, PeSIT and Sterling Connect:Direct protocols
  • Supports use of a FIPS 140-2 compliant data encryption module

Firewall Navigation Best Practices

  • Prevents inbound holes in the firewall
  • Minimizes rich targets in the DMZ by ensuring that files, user credentials and data are not stored in the DMZ
  • Establishes sessions from more-trusted to less-trusted zones
  • Enforces internal and external security policies

Perimeter Security

  • Prevents direct communications between external and internal sessions by establishing secure session breaks in the DMZ using SSL or TLS
  • Inspects protocol and sensitive control information, enabling configurable error handling for violations
  • Session limits and data encryption guard against Denial-of-Service attacks

Authentication Services

  • Customizable logon portal provides self-service password management for trading partners
  • Supports single sign-on and integrates with existing security infrastructure, including Active Directory and Tivoli user databases
  • Multifactor authentication enforces tight controls and validation of trading partner identity in the DMZ before information is passed to the trusted zone
  • Authentication options include IP address, user ID and password, digital certificates, SSH Keys, RSA SecurID

Clustering

  • One central configuration manager pushes out configuration rules to multiple engines running in the DMZ, making it easy to scale
  • Clustering for high availability and load balancing provides operational continuity and improved performance

IBM Sterling Secure Proxy Explainer