Skip to product information
1 of 2

proexcellency

IBM Sterling Secure Proxy Online Training

IBM Sterling Secure Proxy enables shielding to your trusted network by preventing direct connectivity among external partners and internal servers. It can protect your network and data exchanges at the network edge to grant trusted business-to-business transactions and managed file transfer (MFT) file exchanges. Secure Proxy as a Demilitarized zone (DMZ) based proxy, which uses multifactor authentication, SSL session breaks, closing of inbound firewall holes, protocol inspection and
other controls to provide the security of your trusted area. This IBM Sterling Secure Proxy training permits you with a detailed examination of Sterling B2B Integrator, which enables end-to-end enterprise integration server for dynamic real- time and near-real time business collaboration. IBM Sterling Secure Proxy functions as an application proxy among Global Mailbox and a Sterling B2B Integrator server.
Create an inbound node definition for every trading companion connection from outside your company and an outbound node definition for each company server through which Sterling Secure Proxy connects. This IBM Sterling Secure Proxy online training program instruct students on usage, and maintenance of the Sterling Secure Proxy application. It also teaches troubleshooting of any problem in Sterling Secure Proxy.

Benefits of IBM Sterling Secure Proxy:

Data protection: Enables firewall navigation best practices to help you grant perimeter security for enhanced protection of your data and trusted area.

Full authentication services: Offers multifactor authentication for previous connection to backend systems, for closed controls and validation.

Advanced proxy features: Combine proxy support and functions to enhance security of edge-based file transactions.


Dynamic routing: Enables advanced routing to simplify infrastructure adjustments, saving time and minimize risk during migrations.

Sterling Secure Proxy Architecture:

  1.  Sterling Secure Proxy Engine
  2.  Configuration Manager (Sterling Secure Proxy CM)
  3.  Sterling Secure Proxy configuration store
  4.  Sterling Secure Proxy engine properties file
  5.  Web server
  6.  Adapter
  7.  Netmap
  8.  Policy
  9.  Sterling External Authentication Server

Duration

30-35 hrs

Shipping & Returns

Dimensions

Care Instructions

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)