The Secure Shell (SSH) protocol provides strong protection for data in motion over a network. Reflection for Secure IT, Attachmate’s family of SSH clients and servers for Windows and UNIX, leverages this protocol to:
How Safe Is Your Sensitive Information?
Replace FTP and Telnet with Reflection for Secure IT
FTP and Telnet are dangerously nonsecure. They transmit data in the clear, making it easy for hackers to cause irreparable damage. SSH-based Reflection for Secure IT minimizes that risk—by securing file transfers and remote system access over internal and external networks.
Are FTP and Telnet used in your organization?
- Secure file transfers
With Reflection for Secure IT, you can confidently exchange private files between Windows and UNIX servers, or with business partners and customers over the Internet.
- Secure remote system administration
With Reflection for Secure IT, you can use scripting and APIs to automate and schedule routine system administration tasks over a secure channel.
- Secure application access for users
With Reflection for Secure IT, you can protect the network communications of any TCP/IP-based application.
In addition to supporting safer information sharing, Reflection for Secure IT encryption, authentication, and audit logging technologies will help you comply with security mandates such as PCI, Basel II, HIPAA, and Sarbanes-Oxley.
- 1918 The Relationship Between File Transfer, SSH, SCP2 (scp), and SFTP
- 2126 Automating SFTP File Transfers with Reflection for Secure IT
- 2425 Reflection PKI Services Manager Overview
- 2433 Local and Remote Port Forwarding and the Reflection for Secure IT Client 7.0 or Higher
Can't find the product line or product you are looking for?
For information on products that have undergone a name change or are no longer sold or supported, view the
Product Support Lifecycle.