ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Créez et modernisez vos applications d'entreprise à l'aide d'une technologie contemporaine.
The leading solution for COBOL application modernization
Modernisez les applications, les processus de livraison, les accès et l'infrastructure des systèmes IBM mainframe.
Modernisez l'accès des hôtes aux applications : simplifiez l'utilisation, l'intégration et la gestion, et renforcez la sécurité.
Atteindre l'interopérabilité des systèmes dans toute l'entreprise
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Développement sécurisé, test de la sécurité, et surveillance et protection en continu
Augment human intelligence
Anonymisation et confidentialité des données par cryptage, création de jetons d'authentification et gestion des clés
Approche intégrée de la gestion des identités et des accès
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Détectez les menaces, connues et inconnues, via la mise en corrélation, l'ingestion et l'analyse de données.
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Confort d'utilisation attractif et Service Desk efficace, optimisé par l'apprentissage machine
Première solution de surveillance autonome en conteneurs pour l'informatique hybride
Automatisation et gestion des réseaux traditionnels, virtuels et définis par logiciel
Démasquez les éléments de configuration dans vos environnements hybrides et gérez-les.
Simplifier l'automatisation de l'exécution et imposer la gouvernance
Automatiser les processus informatiques de bout en bout
Manage IT & software assets for better compliance
Automatisez le provisionnement, l'application des correctifs et la conformité à l'échelle du Data Center.
Construire, sécuriser et déployer des processus métier automatisés dans toute l'entreprise
Exploitez les précieux renseignements du Big Data à l'aide d'outils d'analyse en temps réel et effectuez des recherches dans les données non structurées.
Toutes les formations Micro Focus en un seul endroit
Acquérir les compétences nécessaires pour réussir
Gagnez en vitesse, éliminez les goulots d'étranglement et améliorez en continu la distribution des logiciels.
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Pour faciliter votre transformation numérique, modernisez les systèmes centraux de l'entreprise.
Créez et modernisez vos applications d'entreprise à l'aide d'une technologie contemporaine.
The leading solution for COBOL application modernization
Modernisez les applications, les processus de livraison, les accès et l'infrastructure des systèmes IBM mainframe.
Modernisez l'accès des hôtes aux applications : simplifiez l'utilisation, l'intégration et la gestion, et renforcez la sécurité.
Atteindre l'interopérabilité des systèmes dans toute l'entreprise
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
La sécurité au cœur de toutes vos activités : opérations, applications, identités et données
Développement sécurisé, test de la sécurité, et surveillance et protection en continu
Augment human intelligence
Anonymisation et confidentialité des données par cryptage, création de jetons d'authentification et gestion des clés
Approche intégrée de la gestion des identités et des accès
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Détectez les menaces, connues et inconnues, via la mise en corrélation, l'ingestion et l'analyse de données.
Access all products in CyberRes
Des solutions fiables et éprouvées pour le juridique, la conformité et la confidentialité
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Accélérez vos opérations informatiques au rythme des DevOps.
Confort d'utilisation attractif et Service Desk efficace, optimisé par l'apprentissage machine
Première solution de surveillance autonome en conteneurs pour l'informatique hybride
Automatisation et gestion des réseaux traditionnels, virtuels et définis par logiciel
Démasquez les éléments de configuration dans vos environnements hybrides et gérez-les.
Simplifier l'automatisation de l'exécution et imposer la gouvernance
Automatiser les processus informatiques de bout en bout
Manage IT & software assets for better compliance
Automatisez le provisionnement, l'application des correctifs et la conformité à l'échelle du Data Center.
Construire, sécuriser et déployer des processus métier automatisés dans toute l'entreprise
Access all products in IT Operations Management
Formulez votre stratégie et transformez totalement votre informatique hybride.
Exploitez les précieux renseignements du Big Data à l'aide d'outils d'analyse en temps réel et effectuez des recherches dans les données non structurées.
Donnez à votre équipe la possibilité de rendre votre entreprise la plus performante possible !
Grupo Financiero Banorte calls itself “The Strong Bank of Mexico” for a good reason. After years of mergers and acquisitions, the 100-year-old company holds fifth place among Mexico’s financial institutions in total assets. It has 10,000 employees, nearly 1,200 branches, and competes successfully against multinational consortiums.
But last year, a new acquisition revealed a serious IT problem: Branch bank employees did not have secure Internet access to corporate information. Banorte solved the problem by replacing a random mix of obsolete host access products with Reflection for the Web.
Industry
Location
Product
In the wake of the acquisition, Banorte’s technical support department was saddled with managing an assortment of terminal emulators that failed to meet current security standards. So the department set out to standardize host access across the board.
Experts from different areas – including systems, technical support, systems security, and quality control – tested myriad terminal emulators. Ultimately, they chose Reflection for the Web. They also employed Inffinix Conectividad, our longtime reseller in Mexico and Latin America, to help get Reflection up and running.
Easily installed on any web server and downloaded to the desktop browser on demand, Reflection for the Web gives local and remote users access to IBM mainframe, AS/400, HP, UNIX, and OpenVMS hosts. Its fully integrated Java client and proxy server provide uncompromised security, including data encryption and user authentication. Together, the Java client and proxy server shield mission-critical host information from spies, hackers, and other known security threats.
For the initial installation, Banorte’s technical support team wanted to connect branch bank servers to treasury management and control applications residing on an HP-UX host in Banorte’s brokerage division.
In just one week, employees at 700 branches were safely accessing the assigned brokerage applications over the Internet. “Implementation was quick and successful,” said Salvador Sierra Hernández, Banorte’s assistant director of technical support. “It was easy to customize Reflection for the Web to meet our needs. And because we didn’t have to physically install the client components on each terminal, we saved considerable time and money.”
Reflection for the Web supports open standards (including Java, SSL, and LDAP), so there were no problems integrating terminal sessions with Banorte’s intranet portal. Users simply click a web link to connect directly to the target host application. Behind the scenes, a Java applet is downloaded from the web server to the browser. Once downloaded, the applet connects directly to the host application, without going back through the server.
The applet contains only the specific functions required by each user, minimizing the footprint on the desktop. Upgrades are automatically deployed each time the user accesses the host application. The entire download and upgrade process takes seconds. Users aren’t even aware that it’s happening.
To protect the UNIX server running the brokerage applications, Banorte’s technical support team used a Reflection for the Web proxy server feature – Secure Token Authorization – to avoid the hassles and risks associated with deploying SSL client certificates to every remote user. Now, digitally signed tokens are deployed to authorized users by the Reflection management server when a secure session is loaded. This ensures that only authorized users can connect to the host system.
With Reflection for the Web, administrators have complete control over which emulation sessions a user or group can access. They can also create personalized sessions for users from any location, at the corporate office or branch level, which greatly simplifies management. “Any configuration changes made at the corporate office are automatically reflected in all sessions,” said Sierra Hernández. “Now we have everything centralized in the same place – the intranet.”
Sierra Hernández has ongoing plans for Reflection for the Web. With the help of Inffinix Conectividad, he intends to roll the product out to all remaining branch banks, and eventually to affiliated businesses.
“Reflection for the Web has become the centerpiece of our information technology and a strategic tool for expanding our services,” he said. “We wanted the best and we found it in Reflection for the Web.”
Reflection for the Web has become the centerpiece of our information technology and a strategic tool for expanding our services. We wanted the best and we found it in Reflection for the Web.
It was easy to customize Reflection for the Web to meet our needs. And because we didn’t have to physically install the client components on each terminal, we saved considerable time and money.