| Key Benefits of Reflection Security Gateway |
|
With RSG, you can:
- Centrally and securely manage your terminal emulation session settings.
- Centrally deploy emulation sessions.
- Require users to authenticate before they connect to the host.
- Control access to emulation sessions using your existing user directory service.
|
The legacy applications that you access through your Attachmate terminal emulators contain sensitive business and customer data—and protecting these applications from unauthorized access isn’t always easy. Too often, host applications don’t offer sophisticated authentication capabilities or integrate with directory services managed by robust identity management solutions.
Attackers are becoming more sophisticated, and today’s authentication and identity management solutions are evolving to match. Shouldn’t your legacy systems benefit from your investments in these modern security solutions?
Bridge the Gap with Reflection Security Gateway
Attachmate terminal emulators offer strong security—but you need all the protection you can get. With Reflection Security Gateway (RSG), you can add an extra layer of security in front of your legacy systems by leveraging your current user authentication infrastructure—and without making any changes to the host. RSG allows you to control access to emulation sessions, preventing unauthorized users from accessing your host applications and reducing the attack surface area of your legacy host systems.
How Reflection Security Gateway Works
RSG works with your Attachmate terminal emulator to bolster your host security, ensuring that only users who need access to applications or data on a specific host system are able to establish a connection between their terminal emulator and that host.
RSG puts an access point in front of the host, requiring that users authenticate before connecting to a host session. This access point can be centrally managed through integration with an enterprise identity management system via LDAP. With RSG, users must first pass through your organization's existing authentication mechanisms. At that point, patented secure token authorization technology ensures that only authorized users can connect to the host.

RSG includes the following security features:
- LDAP access control—Restricts host access using LDAP user/group definitions.
- Non-intrusive LDAP integration—No schema changes required; no data stored in the directory.
- Firewall-friendly remote access—Accesses multiple hosts through one Security Proxy Server port.
- PKI support—Smart cards, X.509 certificates, CRL, and OCSP.
- Encryption—SSL/TLS, with AES 128/256, TripleDES, FIPS 140-2-validated cryptographic modules.
- Authentication—Active Directory Single Sign-On, PKI/smart cards, CA SiteMinder, web portals, and LDAP.
- Broad LDAP support—Active Directory, Novell eDirectory, RACF, and other RFC 2256-compliant LDAP directories.
Top Features in Reflection Security Gateway
RSG provides:
- Multi-factor authentication—all the way to the host
- Integration with existing user directories
- Centralized management of session and macro files
- Non-invasive access control layer
Multi-Factor Authentication
Most legacy host systems offer only simple user authentication, frequently as basic as an eight-character username and password. But how can this low level of security suffice for your legacy applications when it doesn’t for the rest of your enterprise applications?
RSG allows you to use your existing modern authentication tools to better secure your Attachmate terminal emulation sessions. With RSG, you can integrate technologies such as:
- Complex passwords
- CAC, PIV, and other smart card technologies
- Digital certificates and PKI
- Active Directory and other directories
Integration with Existing User Directories
Your user directory is already your system of record for users and groups—so why not leverage it to authorize access to legacy systems? One key advantage of RSG is that it uses your existing directory services to secure connections to host applications. By doing so, RSG allows you to conveniently provide enhanced access control to your host systems.
Centralized Management of Session and Macro Files
Terminal emulation client session files and macros are often created, deployed, modified, copied, and shared around the enterprise by application users as a way to improve efficiency. But over time, session and macro file sprawl—and especially rogue macros designed to cause damage—can create enormous IT headaches. And waiting until a hardware upgrade, operating system migration, or application failure to get a handle on macro sprawl can be expensive.
With RSG, you can finally control session and macro file sprawl and protect your applications against rogue macros by locking them down. Users can download session and macro files, but only after they have been authenticated and authorized. Also, RSG allows you to modify session and macro files quickly, in one place, and make them immediately available to users.
Non-Invasive Access Control Layer
RSG runs externally to your legacy host systems, and allows you to protect your legacy systems against unauthorized users without needing to make any changes to the host. RSG provides extra layers of authentication, authorization, and auditing at the middle tier, where emulation sessions can be centrally controlled and managed. With RSG, users can launch Attachmate emulation sessions on the fly via a web browser, and with more security than ever before.
Maximize the ROI on Your Modern Security Investments
Your security organization has made, or is thinking of making, significant investments in modern authentication and identity management technologies. With RSG, you can better leverage these technologies to protect your critical host assets—and achieve a much greater return on your investments.
For more information on RSG, please download the product datasheet.
Attachmate: A Trusted Partner in Legacy Access Security
For nearly 30 years, Attachmate has developed highly secure terminal emulation products and helped customers seamlessly upgrade from less secure products. Through this deep experience, which includes dedication to a Secure Development Lifecycle, Attachmate allows you to address crucial security risks— and gain control of your terminal emulation desktops using Reflection Security Gateway.