Attachmate Worldwide
|
Contact Us
|
The Attachmate Group
Products
Solutions
Resources
Support
Partners
About Us
Press
Home
»
Resources
» Solution Briefs & White Papers
Contact Attachmate
1.800.872.2829
How to Buy
Evaluate
Solution Briefs and White Papers
Enterprise Fraud Management
Luminet
3 Steps to Simplifying Audits, Showing Compliance, and Managing Enterprise Risk
Attachmate Enterprise Fraud Management Survey: How Technology Trends Are Impacting Data Privacy
Complying with the New Italian Data Protection Authority Regulation: How Attachmate Luminet EFM Software Can Help
Making the Most of Your SIEM Solution: The Complementary Role that Luminet EFM Software Can Play
Medical Alert for Hospitals: Celebrity snooping can kill your reputation
Meeting the PCI DSS Compliance Challenge: How Luminet Enterprise Fraud Management Software Can Help
Mitigating Insider Threats at Telecom Companies: Why You Need Luminet EFM Software
Monitoring Your Health Care Applications: Get Continuous Visibility with Luminet Software
Plugging Information Leaks: Why starting at the application level is important
Shining a Light on Insider Abuse: How Luminet software takes the guesswork out of application monitoring
The Bad Guys Inside Your Bank: How Luminet Software Can Help You Catch Them
Threats from within Your Government Agency: How Luminet Software Can Help You Ward Off Attacks
Who’s Violating Patient Privacy Now? How Luminet Software Can Expose Insider Fraud
Winning the Regulatory Compliance Game: The Challenges You Face and How to Overcome Them
Legacy Modernization
Verastream
A Business-Driven Approach to Legacy Modernization: Rapid service enablement via small, orchestrated steps
Accelerating Integration with Verastream Host Integrator: High-level abstraction is the key
Cloud Enabling Mainframe Applications: Advanced Verastream approach offers less time, cost, and risk
Cloud Enabling Your Mainframe Data: The Verastream Edge
Fundamentals of Service Orientation
Integrated Customer Management: Getting the most out of CRM in mainframe-intensive environments
Integrating Mainframe-Intensive Environments: How reusable services accelerate the process
Legacy Application Modeling with Verastream: Programmatic Integration vs. Traditional Screen Scraping
Legacy Modernization Survey: Results show SOA-enablement trend, accompanied by popular misconceptions
Mobile-Enabling Your Workforce with Applications You Already Have: How Verastream Delivers Enterprise Apps Wherever and Whenever Users Need Them
Modernizing Mainframe Applications in Supply-Chain Environments
Optimizing Mainframe Applications for Reuse with Modern Technologies: Can you really gain flexibility without sacrificing security?
Safe and Economical Reuse of Legacy Applications: When web enablement is the best fit
Service Enablement and Beyond: How Verastream Legacy Modernization Solutions Can Get You There
Speeding up Mainframe Integration
Turning Financial Mainframe Applications into SOA Building Blocks
Verastream Event Handlers
Web Enablement of Mainframe Applications: How Verastream Solutions Provide Speed and Ease
Zero-Footprint Terminal Emulation for Mobile Devices: How Verastream Excels with a Modern Three-Tier Approach
Managed File Transfer
FileXpress
Controlling the Cost of File Transfers
File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement
Making File Transfer Easier, Compliant and More Secure
Secure Data Streaming with Attachmate FileXpress: Why it’s better than the store-and-forward approach
Securing Internet File Transfers
Streamlining Information Workflows with Managed File Transfers
The New Universe of Managed File Transfer: Why your existing solution might not be adequate
PC X Server
Reflection 14.1
UNIX Workstations vs. PC X Servers: Eleven reasons to choose Reflection X
Reflection 2011
Maximize Your Windows 7 Investment with Attachmate Reflection 2011
The Next-Generation PC X Server: How It Maximizes the Value of Your UNIX Applications
Secure File Transfer
Reflection for Secure IT
Fortified SSH: A Cost-Effective Way to Safeguard Your Network
Safeguarding Cardholder Account Data: How Reflection Software Facilitates PCI Compliance
Securing Windows Environments with SSH
Terminal Emulation
EXTRA!
Attachmate Survey: Host Systems and Emulation Solutions Are Still Indispensable
Making Sense of Windows 8 Within Your Enterprise: Best practices for managing a hybrid Windows environment
Safeguarding Cardholder Account Data: How Reflection Software Facilitates PCI Compliance
The Move to Standardized Terminal Emulation: Five questions to help you find the right vendor
Reflection 14.1
Attachmate Survey: Host Systems and Emulation Solutions Are Still Indispensable
Creating Solutions with Reflection and Microsoft Visual Basic for Applications
Making Sense of Windows 8 Within Your Enterprise: Best practices for managing a hybrid Windows environment
Safeguarding Cardholder Account Data: How Reflection Software Facilitates PCI Compliance
The Move to Standardized Terminal Emulation: Five questions to help you find the right vendor
Reflection 2011
Advance Your PCI Compliance with Reflection 2011
Attachmate Survey: Host Systems and Emulation Solutions Are Still Indispensable
Best Practices for Standardizing Your Terminal Emulation:Creating a secure and maintainable emulation infrastructure in a Windows 7 environment
Creating Solutions with Reflection and Microsoft Visual Basic for Applications
Making Sense of Windows 8 Within Your Enterprise: Best practices for managing a hybrid Windows environment
Maximize Your Windows 7 Investment with Attachmate Reflection 2011
Safeguarding Cardholder Account Data: How Reflection Software Facilitates PCI Compliance
The Move to Standardized Terminal Emulation: Five questions to help you find the right vendor
The Perils of Aging Terminal Emulators: Why older emulators present a high security risk
Top 5 Reasons to Switch to a More Secure Emulator
Top 5 Reasons to Switch to a Productivity-Focused Terminal Emulator
Top 5 Reasons to Switch to an Emulator that Works Well with Windows 7
Reflection for the Web
Attachmate Survey: Host Systems and Emulation Solutions Are Still Indispensable
Protecting Legacy Host Applications with Modern Security
Safeguarding Cardholder Account Data: How Reflection Software Facilitates PCI Compliance
The Move to Standardized Terminal Emulation: Five questions to help you find the right vendor
The Perils of Aging Terminal Emulators: Why older emulators present a high security risk
Unisys
DATABridge
A Powerful Profit Generator for Telecommunications Companies: Use the voice mail data sitting on your Unisys CAP System to improve ROI
Benefits of Using DATABridge for Unisys CAP Customers
Integrating DMSII Database Information: How the DATABridge approach can make it less costly and more practical
Unisys
A Powerful Profit Generator for Telecommunications Companies: Use the voice mail data sitting on your Unisys CAP System to improve ROI
Benefits of Using DATABridge for Unisys CAP Customers
Integrating DMSII Database Information: How the DATABridge approach can make it less costly and more practical
Resources
Videos
Product Demos
Blogs
Analyst Papers
eBooks
Webcasts
Solution Briefs & White Papers
Customer Stories
Product Datasheets
Read Our Blogs
Application Integration
The Attachmate blog on legacy modernization and other technology trends
.
Data In Motion
The Attachmate blog on data security and file transfer
.
Insider Fraud Spotlight
The Attachmate blog on enterprise fraud management
.