• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Attachmate Masks IBM i, z/OS Data Within the Emulator

    November 8, 2011 Alex Woodie

    Ensuring the security of information is the main driver behind Attachmate‘s latest terminal emulation software release. New features unveiled last week in Reflection 2011 R2, such as the capability to mask data on live screens and the capability to prevent users from logging on via unencrypted connections, are designed to prevent the unauthorized access of data from host systems, including IBM i and z/OS servers.

    Locking down enterprise host systems is not always a straightforward task. While industry regulations like PCI DSS and HIPAA are pretty clear in describing what types of activities won’t be tolerated, it’s another task entirely to implement those requirements in the real world, with its multitude of different host platforms, business processes, and even traditions.

    As one of the largest providers of terminal emulation software, Attachmate stands at the critical junction–or the interface, if you will–between the employees who work on host systems and make the company run, and the enterprise applications that corporations rely on to enforce business policies and automate repetitive tasks. To that end, Attachmate has built security into its emulators for years, with support for features like encrypted sessions, public key infrastructure (PKI) certificates, single sign-on, and smart card authentication.

    But with the addition of its new data masking technology, Attachmate is taking its security up a level. This feature will prevent workers from seeing sensitive pieces of read-only data on 5250 and 3270 screens, such as a complete credit card number, while showing employees enough of the data to still be able to do their job. The new data masking capability will also obscure data as workers enter it, preventing criminals from getting sensitive data by peering over employees’ shoulders.

    The inclusion of data masking is potentially of very great benefit to Reflection customers, considering that implementing data masking has heretofore been a pretty complicated task (akin to encrypting tables in a database) that also required the licensing of a separate data masking product. Attachmate says the feature support is patent-pending, and that it does support Japanese.

    Reflection 2011 R2 also gives administrators more granular control over their users, such as by requiring users to connect to certain applications over encrypted lines, and allowing admins to assign different levels of access to private information on host screens.

    “With all of the news of sensitive customer data being compromised by large organizations, security is top of mind for our enterprise customers,” states Attachmate vice president of marketing Eric Varness in a press release. “As such, we’re delivering a game-changing new capability that enables organizations to protect sensitive data on host screens, facilitating compliance with industry and government regulations, like PCI DSS.”

    Attachmate added several other new features to Reflection 2011 R2. It gets a new “Web browser mode” that provides “browser-like” capabilities and gives users access to more screen real estate, without requiring users’ fingers to leave the keyboard, the company says. It also gets a new Visual Studio .NET control that developers can use to add features to and enhance the legacy host application, but without directly modifying it.

    Reflection 2011 R1 runs on Microsoft Windows 7, and takes advantage of that operating system’s user account control (UAC) security mode. It also supports Office 2010 productivity features, such as the ribbon user interface. It has also been certified for deployment atop VMware virtualization software, and has achieved VMware Ready status.

    Attachmate also unveiled Reflection Suite for X 2011 R2, a new release of its X server product that gives users access to graphic-intensive X Windows applications that are commonly used in the manufacturing, chip design, oil exploration, healthcare, telecom, and finance industries.

    Reflection Suite for X also includes text-based 5250, 3270, and VT emulators, and with R2, the vendor provides some of the capabilities that it offers in the host-based versions of Reflection, including the Ribbon interface, and new capabilities for locking down macros and application searches, among other benefits.

    Reflection Suite for X is also newly “firewall friendly,” enabling remote users to access corporate and local assets, without compromising permissions or security policies. R2 also gives administrators the capability to centrally manage Reflection X Advantage user configurations and Unix/Linux access from the Reflection for the Web (RWeb) Administrator console, which saves time and enables real-time updates, the vendor says. This release also brings native 64-bit support for Windows 7.

    Reflection is one of three families of terminal emulation software offered by Attachmate. Its EXTRA! line of emulators is most often used by Attachmate’s IBM i customers, while the Reflection line (obtained with its acquisition of WRQ years ago) sees more use in Unix environments. Nonetheless, the Reflection products do contain 5250 emulation capabilities.

    The Reflection product suite includes seven specific products, each with overlapping features. The first Reflection R1 product to be released was Reflection Suite for X, which was unveiled last year alongside Reflection for the Web 2008 R3. In June, Attachmate rolled out Reflection for the Web 2011.

    Users of various Attachmate emulation products can upgrade to Reflection 2011, including users of EXTRA! and myEXTRA! For more information, see the vendor’s website at www.attachmate.com.

    RELATED STORIES

    Attachmate Delivers Reflection for the Web 2011 R1

    Attachmate Updates Reflection Suites

    Legacy-Loving Attachmate Shells Out $2.2 Billion for Novell

    Attachmate Refreshes Emulator with Useful New Features

    Attachmate Partners with Emirates for Airline App

    Attachmate Roots Out Insider Fraud with New Software

    Attachmate Claims Industry First with Emulator’s Support for App-V

    Attachmate Emulator to Deploy Via App-V

    VCs That Bought WRQ Acquire Competitor Attachmate

    WRQ Acquired by Venture Capitalists

    Security Specialist PentaSafe Acquired by NetIQ



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Shield Advanced Solutions:  Access IBM i data & objects from Linux & Windows Servers using PHP
    Dan Riehl Presents:  Fall Training Sale – Discounts up to 40%! RPG IV COBOL CL Admin Security
    ProData Computer Services:  Learn how to access remote data -- RDB Connect On-Demand Webinar

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Small Businesses Agree Social Media Is A Path To Customers Add Powerful Generic Processing to Your Applications

    Leave a Reply Cancel reply

Volume 11, Number 37 -- November 8, 2011
THIS ISSUE SPONSORED BY:

Vision Solutions
Profound Logic Software
inFORM Decisions
VAULT400
Shield Advanced Solutions

Table of Contents

  • Arpeggio Introduces IBM i Security Monitoring Solutions
  • Lavastorm: An Analytic Power Tool for All Seasons
  • Attachmate Masks IBM i, z/OS Data Within the Emulator
  • IBM Rolls Out Security Analytics and Managed Service Offerings
  • Ari Kugler to Discuss IBM’s IBM i Cloud Strategy in Symmetry Webinar
  • ManageEngine Updates Apps Manager
  • Quadrant Ships IRS Forms Packs for 2011
  • Jack Henry ATM Deposit Solution Integrated with Core Banking Systems
  • SugarCRM Bolsters Development, Admin Features with Version 6.3
  • Kronos Launches New InTouch Time Clock

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle