Host Access for the Cloud

Features

Centrally define and deliver secure host access sessions
Centrally define and deliver secure host access sessions

Deliver browser-based, HTML5 access to 3270, 5250, VT, Unisys and Airline host application sessions from a central location – without the need to touch the desktop or manage Java runtime environments. Protect communications with HTTPS, TLS, and SSH security.

Leverage your existing user directory
Leverage your existing user directory

Provide secure access to your host systems using your existing identity management solution. With Active Directory/LDAP integration, easily entitle emulation sessions to trusted end users.

Easily control user access
Easily control user access

With centralized administration, control user access to mainframe applications from a single web-based console. Quickly confirm that a user has been authenticated and granted access to a host session before that session is ever allowed.

Monitor and meter usage
Monitor and meter usage

Use centralized activity logging to identify which users are accessing your host systems. Monitor and report on user and session volumes and optimize how you allocate computing resources and provision user access rights.

More Features

Foot print
Eliminate desktop touches

Easily deliver zero-footprint terminal emulation across the enterprise without the need to manage desktop software.

Retina scan
Centralize control

Define and provision emulation sessions, control user access to mainframe applications, and monitor usage – all from a single, central point of administration.

Play
Meter, report, optimize

Leverage centralized metering and reporting to optimize computing resource allocation and track user access.

Team up with Host Access Management and Security Server (MSS)

Interaction
Integrate the host and IAM

Streamline and secure your host-access operation by teaming Reflection, Extra!, Rumba+, or InfoConnect with MSS. Working with your Identity and Access Management (IAM) system, MSS seamlessly propagates changes to application settings and user-specific content from a central server.

Lock key
Take centralized control

Manage host-access operations from your central MSS console. Lock down 100s (or 1000s) of far-flung desktops with ease. Grant or deny access based on group or role. Apply changes quickly to align with business needs.

Password 1
Reinforce security as you remove passwords

Finally, you can bring your host into the IAM fold. That means you can replace weak, eight-character passwords with strong, complex ones. Implement best-fit multifactor authentication methods.

Host Access Management and Security Server

release-rel-2019-11-1-3171 | Wed Nov 13 04:28:31 PST 2019
3171
release/rel-2019-11-1-3171
Wed Nov 13 04:28:31 PST 2019