Host Access and Security

Getting mainframe and legacy system information to your modern endpoints is about more than providing host access. The challenge is to find the right terminal emulator: one that brings the data into the modern world, rather than forcing your users into an environment that feels like the past. Many products emulate—very few provide secure host access that meets your productivity needs.

Product Portfolio ›

Guy on Chair

Make your terminal emulation empower your business:

Enhance employee productivity

Free your users from frustration with modern productivity tools built in to your emulator.

Read more ›

Offer mobility and remote access

Nowadays, we work on PCs, tablets, and mobile phones. Shouldn’t your emulator?

Read more ›

Maintain host security

Protect your data and comply with security mandates.

Read more ›

Standardize your emulation

Reduce complexity and cost, and tightening up your data security, by reducing the number of vendors you have to work with.

Read more ›

Centralize management

Manage, deploy, update and configure your host sessions from one place.

Read more ›

Product Portfolio


Reflection

A Windows-based family of terminal emulators that gives users anywhere, anytime access to IBM, UNIX, Linux, OpenVMS, HP, and X11 hosts from their desktops or mobile devices.

A web-based family of terminal emulators that connects browser users to IBM, UNIX, Linux, Unisys, OpenVMS, and HP hosts, along with the wide range of systems used by the airline and travel industries. Easily installed on any web server and downloaded to the desktop on demand, these products simplify management, boost productivity, and keep your data secure.

A powerful add-on product that works with your existing Identity Access Management (IAM) system to centrally manage and secure Reflection, Extra!, and InfoConnect terminal emulation sessions.

A Windows-based family of PC X servers that connects Windows users to graphical and text-based applications on UNIX, Linux, OpenVMS, IBM, and HP hosts. From classic to cutting-edge capabilities, Reflection X 2014 has you covered.

Extra!

A Windows-based family of terminal emulators that connects users to IBM, UNIX, Linux, OpenVMS, and HP NonStop/Tandem hosts. All are designed to be easy to use, easy to manage, and highly secure.

InfoConnect

A family of Windows-based terminal emulators, print delivery options, and software development tools that enables users to access and print from multiple systems, including TPF/ALCS, Unisys, UNIX, Linux, and IBM.

Library


Customer story
Customer story
Datasheet

Attachmate Reflection X 2014

With Attachmate Reflection X 2014, Windows users can quickly access rich, precise X graphics applications from any modern Windows desktop—locally or across the globe. Delivering enhanced support for remote users, more powerful administrative control, and LDAP authentication to better protect host applications, this next-generation X server gives you the flexibility you want and the security you can’t do without.

Customer story
Customer story
Customer story
Customer story
White paper

Safeguarding Cardholder Account Data

In 2004, the major credit card companies—including Visa, MasterCard, and American Express—joined forces to create the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS applies to all companies that store, process, or transmit cardholder account data. Its purpose: to ensure data privacy for consumers via strict security controls across the industry. A series of compliance deadlines have sent organizations scrambling to meet the twelve broad PCI DSS requirements. These requirements range from being relatively easy to implement—such as ensuring up-to-date anti-virus software—to complex and demanding—such as tracking access to network resources and cardholder data. This white paper tells how Attachmate® Reflection® terminal emulators, file transfer utilities, and SSH clients and servers can help you achieve PCI DSS compliance. By the time you’re done reading, you’ll know which Reflection products can help you address specific PCI requirements—and how they do it. You’ll also see that Reflection enables compliance beyond terminal emulation and file transfer into areas you may not have considered before.

Video

Secure Host Access with Reflection Terminal Emulation

Enterprise networks face increasing security threats from both external and internal sources. In this video, you’ll find out how Reflection helps you thwart the latest security threats and comply with important requirements and standards such as Sarbanes-Oxley, HIPAA, Basel III, and PCI DSS.

Customer story
Video

Securely Bridging HTTP and FTP with FileXpress Internet Server

Did you know that you can configure an internal FTP server to allow secure access by partners or customers via HTTP(S)? You can, with Attachmate FileXpress Internet Server. Watch this technical video to find out how it’s done.

Video

Standardize Your Terminal Emulation with a Proven Methodology

Are you thinking about standardizing on one terminal emulator, but are concerned about disruption, workload, and complexity? If so, watch this video to learn a field-tested method for finding, analyzing, deduping, converting, and consolidating your existing emulation files—straight from the experts at Attachmate Consulting Services.

Analyst paper
Datasheet

The All-in-One Emulator

Designed to help meet all of your host access needs, Attachmate Reflection 2014 allows you to connect to IBM, UNIX, Linux, OpenVMS, and HP host types.

Datasheet

The All-in-One Emulator

Designed to help meet all of your host access needs, Attachmate Reflection 2014 allows you to connect to IBM, UNIX, Linux, OpenVMS, and HP host types.

Customer story
Video

User Productivity Capabilities in Reflection Terminal Emulation

With Reflection, your users can copy host data into a Word doc, email message, or PowerPoint slide with the click of a button. Watch this video to see how Reflection incorporates Microsoft Office features such as Auto Complete, Auto Expand, Spell Check, Scratch Pad, Recent Typing, and Screen History—making host applications as easy to use as Office applications.

Webcast

Webinar: Securing Host Access with Reflection Security Gateway

Watch the webinar now and find out how to extend your modern security and authentication to your host applications without requiring changes to the host system.

Want to know more? We're here to help.