Home » Computer & Software » Networking » Attachmate Extends Modern Security to Legacy Applications With Reflection Security Gateway 2014
Ihren XING-Kontakten zeigen

Attachmate Extends Modern Security to Legacy Applications With Reflection Security Gateway 2014

SEATTLE, WA — (Marketwired) — 10/16/13 — Attachmate Corporation, , announced today the launch of Attachmate® Reflection® Security Gateway 2014, a new software product designed to help address the problem of integrating host systems with modern security infrastructure. Reflection Security Gateway leverages mature, proven and patented technology to extend an enterprise-s authentication and identity management investments to their access controls for host systems.

“Until now, nobody has effectively solved the problem of extending modern access control technologies, such as enterprise identity management and strong authentication, to host application access,” said Sam Morris, director of product marketing and product management at Attachmate. “Reflection Security Gateway provides organizations with a combined set of management and security capabilities unparalleled by any other emulation vendor in the market.”

In addition to its access control capabilities, provides capabilities that assist IT desktop managers in their efforts to manage and maintain their terminal emulation environment. As more IT desktop and security managers face migrations from the Windows XP operating system, new technologies that drive down the cost of those migrations, both during and after, are critical. In particular, for enterprises with broad deployments of terminal emulation clients, Reflection Security Gateway is changing how organizations manage and secure their host access environments while realizing greater ROI on their host access and modern security investments.

Reflection Security Gateway 2014 enables Attachmate-s terminal emulation customers to:

by extending enterprise identity management technologies to host application access.

of managing the terminal emulation software that sits on hundreds or even thousands of desktops in the enterprise.

by making it easy to push terminal emulation configurations to multiple desktops.

“Many organizations and IT departments are facing disruption and cost implications with the end of life of the Windows XP operating system and need to migrate their terminal emulation clients to the new desktop platform,” said Morris. “These organizations are looking for ways to make their new desktop environment easier and less costly to manage. By centralizing the management of terminal emulation configurations and integrating with the enterprise user directory, Reflection Security Gateway gives desktop managers a more efficient way to deliver host sessions to user desktops. This results in a lower TCO for their new desktops. It is truly powerful.”

With Reflection Security Gateway 2014, IT desktop managers will benefit from centralized management capabilities that simplify the process of pushing terminal emulation configuration changes out to the desktop. The product offers two major desktop management features that save valuable time:

, which enables users to launch desktop emulation sessions from a centrally administered location, allowing changes to those sessions to happen in one place. All users with access to that session receive those changes the next time they launch the session.

that allows administrators to easily deploy packages of emulation content, such as keyboard maps and macros down to user desktops, all from a central location.

Reflection Security Gateway provides IT security managers with access control capabilities that extend enterprise identity management and authentication technologies to host access in combination with session-level access control enforcement. The top security management features include:

, which requires a user to first authenticate to Reflection Security Gateway before accessing a host. This validates the user-s credentials using the organization-s existing authentication infrastructure. Security managers are able to extend their enterprise authentication technologies out to their host systems accessed via Attachmate terminal emulators.

, whereby Reflection Security Gateway verifies that the administrator has granted a user access to the host session before allowing the session. Since access rights can be controlled through LDAP group membership, security managers are able to extend their existing enterprise identity management infrastructure to access control to host systems.

at the perimeter which uses Attachmate-s patented secure token authorization technology to verify that the user is authorized to connect to the host. With Reflection Security Gateway, users who have not been authorized through the enterprise directory cannot connect to the host.

By extending the reach of their modern security infrastructure to legacy host systems, security managers are able to more consistently apply access control policy across their organization and drive more value into their access control technology investments.

For more information about Reflection Security Gateway, please visit

For 30 years, has been delivering essential business information to the right users, in the right formats, via the right devices. Today, Attachmate software runs on 19 million desktops and mobile devices — across industries ranging from financial services, healthcare, and government to retail, travel, and manufacturing. Built to integrate existing systems and emerging technologies, our products help organizations worldwide put their IT assets to work in new and meaningful ways.

Copyright © 2013 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, the Attachmate logo and Reflection are either trademarks or registered trademarks of Attachmate Corporation, in the USA and other countries. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners.

Holly Zuluaga
Office: (206) 282-4923, x 117
Email:

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop