ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
최신 기술을 사용하여 비즈니스 애플리케이션을 구축하고 모더나이제이션합니다
The leading solution for COBOL application modernization
IBM 메인프레임 애플리케이션, 딜리버리 프로세스, 액세스 및 인프라를 현대화합니다
보다 쉬운 사용법, 보다 쉬운 통합, 보다 쉬운 관리, 더 우수한 보안으로 호스트 애플리케이션 액세스를 현대화합니다
기업 내 시스템 상호 운용성을 확보합니다
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
개발, 보안 테스트, 연속 모니터링 보안 및 보호
Augment human intelligence
데이터 재파악 및 개인정보를 위한 암호화, 토큰화, 키 관리
ID 및 액세스 관리의 통합 방식
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
상관관계, 데이터 수집 및 분석을 통해 알려진 위협과 알려지지 않은 위협을 탐지합니다
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
머신 러닝에 기반하여 최종 사용자 경험과 효율적인 서비스 데스크 연계
하이브리드 IT를 위한 최초의 컨테이터화된 익명 모니터링 솔루션
전통적인 네트워크와 가상 및 소프트웨어 정의 네트워크를 자동화하고 관리합니다
하이브리드 IT 환경의 구성 항목(CI)을 찾고 관리할 수 있습니다.
이행 자동화 간소화 및 거버넌스 강화
종합적인 IT 프로세스 자동화
Manage IT & software assets for better compliance
데이터 센터 간 프로비져닝, 패칭, 컴플라이언스를 자동화합니다
기업 전반에서 자동화된 비즈니스 프로세스를 구축하고 보안을 유지하고 규모를 조정할 수 있습니다
모든 Micro Focus 학습이 한 곳에서 제공됩니다
성공에 필요한 역량을 쌓습니다
속도를 높이고 병목 현상을 제거하고 소프트웨어 딜리버리를 지속적으로 개선하십시오
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
비즈니스 변혁을 촉진하도록 핵심 비즈니스 시스템을 현대화합니다
최신 기술을 사용하여 비즈니스 애플리케이션을 구축하고 모더나이제이션합니다
The leading solution for COBOL application modernization
IBM 메인프레임 애플리케이션, 딜리버리 프로세스, 액세스 및 인프라를 현대화합니다
보다 쉬운 사용법, 보다 쉬운 통합, 보다 쉬운 관리, 더 우수한 보안으로 호스트 애플리케이션 액세스를 현대화합니다
기업 내 시스템 상호 운용성을 확보합니다
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
운영, 애플리케이션, 정체성, 데이터 등 핵심 업무 항목에 보안을 제공합니다
개발, 보안 테스트, 연속 모니터링 보안 및 보호
Augment human intelligence
데이터 재파악 및 개인정보를 위한 암호화, 토큰화, 키 관리
ID 및 액세스 관리의 통합 방식
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
상관관계, 데이터 수집 및 분석을 통해 알려진 위협과 알려지지 않은 위협을 탐지합니다
Access all products in CyberRes
믿을 수 있고 입증된 법률, 컴플라이언스 및 개인 정보 보호 솔루션
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
DevOps 속도로 IT 운영을 가속화합니다
머신 러닝에 기반하여 최종 사용자 경험과 효율적인 서비스 데스크 연계
하이브리드 IT를 위한 최초의 컨테이터화된 익명 모니터링 솔루션
전통적인 네트워크와 가상 및 소프트웨어 정의 네트워크를 자동화하고 관리합니다
하이브리드 IT 환경의 구성 항목(CI)을 찾고 관리할 수 있습니다.
이행 자동화 간소화 및 거버넌스 강화
종합적인 IT 프로세스 자동화
Manage IT & software assets for better compliance
데이터 센터 간 프로비져닝, 패칭, 컴플라이언스를 자동화합니다
기업 전반에서 자동화된 비즈니스 프로세스를 구축하고 보안을 유지하고 규모를 조정할 수 있습니다
Access all products in IT Operations Management
전략을 수립하고 하이브리드 IT를 변환합니다.
실시간 분석을 통해 빅 데이터에서 통찰력을 확보하여 비구조화 데이터를 검색합니다.
팀이 비즈니스 성과를 극대화하도록 지원합니다
Private HP e3000-based information needed to be secured for public Internet travel.
In the mercurial world of financial services, instant access to real-time information spells competitive advantage. But securing that information for Internet travel can present a huge technological hurdle. The IT department at CANNEX made the leap with the help of two products: Reflection (thick client) and Reflection for the Web.
There was a time when financial institutions had to phone around to learn how competitors were pricing interest rates and calculation values. Brokers and other financial consumers had to merge data from individual faxes into their own tables.
Today, thanks to the CANNEX System, providers and consumers of financial information can easily download or print out a consolidated view of all financial products and services. The CANNEX System is an application running on an HP e3000 at CANNEX headquarters. CANNEX’s clients maintain product and service information on this system via online access or file transmission.
For nearly two decades, CANNEX has been using Reflection software to give their clients access to the CANNEX System. “From time to time, we’ve investigated other options,” said Steve Waters, vice president of systems at CANNEX. “But they’ve always turned out to be clearly inferior to Reflection.”
CANNEX has an agreement involving Reflection (thick client) and Java-based Reflection for the Web, which they started using in 2000. The agreement allows CANNEX to embed an auto-connector code in Reflection before sending it to their clients. Waters determines whether clients get Reflection or Reflection for the Web based on the functionality they need.
If clients need host-initiated file transfers, CANNEX sends them Reflection, which users can easily install without IT help. To connect, they simply click the CANNEX System prompt and log on to the HP e3000 via modem or the Internet.
If clients don’t need host-initiated file transfers, they get server-based Reflection for the Web. Users go to the CANNEX System web page and download the Reflection applet. Once downloaded, the applet connects directly to the host application, without going back through the web server.
As e-business grew, however, Waters and his team needed a way to protect client data traveling over the Internet. “No one wants modems on their desktops anymore,” Waters said. “They’re slow, cumbersome, and pose a security threat to the corporate LAN.”
Steve Waters – VICE PRESIDENT OF SYSTEMS
CANNEX
Based in Toronto, Canada, CANNEX specializes in gathering and compiling information about products and services offered by financial institutions in Canada, the United States, Australia, and New Zealand. It then redistributes that information to brokers, agents, and analytical service providers via web pages, electronic files, emails, or faxes.
After investigating the new security features in the latest Reflection releases, Waters decided to retain Reflection as their host-access standard. “Nothing else on the market comes close to the depth of security Reflection currently offers,” he said. Reflection was outfitted with SSL/TLS support, and Reflection for the Web now included RSA authentication for SSL, key exchange for SSL, and SSL client authentication and authorization via an SSL proxy server.
The new security options gave Waters an idea: Why not configure Reflection to take advantage of Reflection for the Web’s security proxy server? This would ensure that connections coming from the Internet were encrypted and authenticated. With the help of Technical Support, he brought his idea to life.
The proxy server, which runs on any Java-enabled server or host, sits on CANNEX’s network perimeter and encrypts data between itself and the client. Reflection sessions are configured to pass through the proxy server before connecting to the CANNEX System. This way, the proxy server shields the host from external intruders and safeguards data leaving the network.
The same precautions apply to Reflection for the Web applets. But for web-based sessions, the proxy server also uses digitally signed tokens to ensure that only authorized users can connect to the host. The tokens are deployed to authorized users by the Reflection management server, which checks with CANNEX’s LDAP access control model to verify user authorization. The token system also enables users to connect to multiple host systems through a single open port (port 443) in the CANNEX firewall.
Steve Waters – VICE PRESIDENT OF SYSTEMS
CANNEX
According to Waters, the benefits of upgrading Reflection are clear. He didn’t have to buy any hardware, and it took just 20 hours to get Reflection integrated with the CANNEX System. Best of all, CANNEX’s clients notice the difference.
“Right away, 80 of our clients said they were impressed by the products’ new features,” Waters said. “We usually don’t hear from clients when things are good. That’s unusual and invaluable feedback.