• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Attachmate Masks IBM i, z/OS Data Within the Emulator

    November 8, 2011 Alex Woodie

    Ensuring the security of information is the main driver behind Attachmate‘s latest terminal emulation software release. New features unveiled last week in Reflection 2011 R2, such as the capability to mask data on live screens and the capability to prevent users from logging on via unencrypted connections, are designed to prevent the unauthorized access of data from host systems, including IBM i and z/OS servers.

    Locking down enterprise host systems is not always a straightforward task. While industry regulations like PCI DSS and HIPAA are pretty clear in describing what types of activities won’t be tolerated, it’s another task entirely to implement those requirements in the real world, with its multitude of different host platforms, business processes, and even traditions.

    As one of the largest providers of terminal emulation software, Attachmate stands at the critical junction–or the interface, if you will–between the employees who work on host systems and make the company run, and the enterprise applications that corporations rely on to enforce business policies and automate repetitive tasks. To that end, Attachmate has built security into its emulators for years, with support for features like encrypted sessions, public key infrastructure (PKI) certificates, single sign-on, and smart card authentication.

    But with the addition of its new data masking technology, Attachmate is taking its security up a level. This feature will prevent workers from seeing sensitive pieces of read-only data on 5250 and 3270 screens, such as a complete credit card number, while showing employees enough of the data to still be able to do their job. The new data masking capability will also obscure data as workers enter it, preventing criminals from getting sensitive data by peering over employees’ shoulders.

    The inclusion of data masking is potentially of very great benefit to Reflection customers, considering that implementing data masking has heretofore been a pretty complicated task (akin to encrypting tables in a database) that also required the licensing of a separate data masking product. Attachmate says the feature support is patent-pending, and that it does support Japanese.

    Reflection 2011 R2 also gives administrators more granular control over their users, such as by requiring users to connect to certain applications over encrypted lines, and allowing admins to assign different levels of access to private information on host screens.

    “With all of the news of sensitive customer data being compromised by large organizations, security is top of mind for our enterprise customers,” states Attachmate vice president of marketing Eric Varness in a press release. “As such, we’re delivering a game-changing new capability that enables organizations to protect sensitive data on host screens, facilitating compliance with industry and government regulations, like PCI DSS.”

    Attachmate added several other new features to Reflection 2011 R2. It gets a new “Web browser mode” that provides “browser-like” capabilities and gives users access to more screen real estate, without requiring users’ fingers to leave the keyboard, the company says. It also gets a new Visual Studio .NET control that developers can use to add features to and enhance the legacy host application, but without directly modifying it.

    Reflection 2011 R1 runs on Microsoft Windows 7, and takes advantage of that operating system’s user account control (UAC) security mode. It also supports Office 2010 productivity features, such as the ribbon user interface. It has also been certified for deployment atop VMware virtualization software, and has achieved VMware Ready status.

    Attachmate also unveiled Reflection Suite for X 2011 R2, a new release of its X server product that gives users access to graphic-intensive X Windows applications that are commonly used in the manufacturing, chip design, oil exploration, healthcare, telecom, and finance industries.

    Reflection Suite for X also includes text-based 5250, 3270, and VT emulators, and with R2, the vendor provides some of the capabilities that it offers in the host-based versions of Reflection, including the Ribbon interface, and new capabilities for locking down macros and application searches, among other benefits.

    Reflection Suite for X is also newly “firewall friendly,” enabling remote users to access corporate and local assets, without compromising permissions or security policies. R2 also gives administrators the capability to centrally manage Reflection X Advantage user configurations and Unix/Linux access from the Reflection for the Web (RWeb) Administrator console, which saves time and enables real-time updates, the vendor says. This release also brings native 64-bit support for Windows 7.

    Reflection is one of three families of terminal emulation software offered by Attachmate. Its EXTRA! line of emulators is most often used by Attachmate’s IBM i customers, while the Reflection line (obtained with its acquisition of WRQ years ago) sees more use in Unix environments. Nonetheless, the Reflection products do contain 5250 emulation capabilities.

    The Reflection product suite includes seven specific products, each with overlapping features. The first Reflection R1 product to be released was Reflection Suite for X, which was unveiled last year alongside Reflection for the Web 2008 R3. In June, Attachmate rolled out Reflection for the Web 2011.

    Users of various Attachmate emulation products can upgrade to Reflection 2011, including users of EXTRA! and myEXTRA! For more information, see the vendor’s website at www.attachmate.com.

    RELATED STORIES

    Attachmate Delivers Reflection for the Web 2011 R1

    Attachmate Updates Reflection Suites

    Legacy-Loving Attachmate Shells Out $2.2 Billion for Novell

    Attachmate Refreshes Emulator with Useful New Features

    Attachmate Partners with Emirates for Airline App

    Attachmate Roots Out Insider Fraud with New Software

    Attachmate Claims Industry First with Emulator’s Support for App-V

    Attachmate Emulator to Deploy Via App-V

    VCs That Bought WRQ Acquire Competitor Attachmate

    WRQ Acquired by Venture Capitalists

    Security Specialist PentaSafe Acquired by NetIQ



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    LaserVault

    Integrate Virtual Tape to Automate Your Backups And Strengthen Your Ability To Recover From Cyber Attacks And Disasters

    With most IT departments stretched thin, finding something that can quickly free up IT time is definitely a bonus. That’s why it’s important to stop and take a look at integrating virtual tape into your backup and recovery. Virtual tape is one of those technologies where once you have it, you’ll wonder why you didn’t do it sooner. See a demo and get a $50 gift card.

    But what is it about using virtual tape that makes it so worthwhile? Why is it that so many IBM i shops are already using or considering using virtual tape for all or part of their backup and recovery systems?

    Virtual tape and virtual tape libraries offer a way to both simplify and strengthen backup and recovery operations. By incorporating virtual tape technology, automation of backups becomes possible resulting in hundreds of hours saved annually for IT departments and personnel.

    “We needed to find a replacement that would lower the maintenance cost and reduce complexity of our backup and recovery functions without a major disruption to our operations.” David Fray, Director of Enterprise Systems, ABC Financial

    LaserVault ViTL is a virtual tape and tape library solution developed specifically for use with IBM Power Systems (from AS/400 to iSeries to Power 9s). With ViTL you can:

    • Replace physical tape and tape libraries and eliminate associated delays
    • Automate backup operations, including the ability to purge or archive backups
    • Remotely manage your backups – no need to be onsite with your server
    • Save backups to a dedupe appliance and the cloud
    • Recover your data at lightspeed greatly improving your ability to recover from cyberattacks
    • And so much more

    Sign-up now to see a ViTL online demo and get a $50 Amazon e-gift card when the demo is complete as our way of saying thanks for your time. Plus when you sign-up you’ll receive a free facts comparison sheet on using virtual tape vs tape so you can compare the functionality for yourself.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Shield Advanced Solutions:  Access IBM i data & objects from Linux & Windows Servers using PHP
    Dan Riehl Presents:  Fall Training Sale – Discounts up to 40%! RPG IV COBOL CL Admin Security
    ProData Computer Services:  Learn how to access remote data -- RDB Connect On-Demand Webinar

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Small Businesses Agree Social Media Is A Path To Customers Add Powerful Generic Processing to Your Applications

    Leave a Reply Cancel reply

Volume 11, Number 37 -- November 8, 2011
THIS ISSUE SPONSORED BY:

Vision Solutions
Profound Logic Software
inFORM Decisions
VAULT400
Shield Advanced Solutions

Table of Contents

  • Arpeggio Introduces IBM i Security Monitoring Solutions
  • Lavastorm: An Analytic Power Tool for All Seasons
  • Attachmate Masks IBM i, z/OS Data Within the Emulator
  • IBM Rolls Out Security Analytics and Managed Service Offerings
  • Ari Kugler to Discuss IBM’s IBM i Cloud Strategy in Symmetry Webinar
  • ManageEngine Updates Apps Manager
  • Quadrant Ships IRS Forms Packs for 2011
  • Jack Henry ATM Deposit Solution Integrated with Core Banking Systems
  • SugarCRM Bolsters Development, Admin Features with Version 6.3
  • Kronos Launches New InTouch Time Clock

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26
  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.