ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Создавайте и модернизируйте бизнес-приложения с использованием современных технологий
The leading solution for COBOL application modernization
Модернизируйте мэйнфрейм-приложения IBM, процессы доставки, средства доступа и инфраструктуру.
Модернизация доступа приложений к хосту: проще, удобнее в интеграции и управлении, безопаснее
Достижение взаимодействия систем на уровне предприятия
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Безопасная разработка, тестирование параметров безопасности, непрерывный мониторинг и защита информации
Augment human intelligence
Шифрование, токенизация данных и управление ключами безопасности для деидентификации и сохранения конфиденциальности данных
Интегрированный подход к управлению идентификацией и доступом
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Определяет ранее известные и новые угрозы с помощью корреляции, приема данных и аналитики
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Удобный пользовательский интерфейс и высокая эффективность работы службы поддержки основаны на технологии машинного самообучения
Первое контейнеризированное автономное решение для контроля работы гибридных ИТ
Автоматизация и управление для традиционных, виртуальных и программно-определяемых сетей
Обнаружение элементов конфигурации и управление ими в гибридных ИТ-средах.
Упрощение автоматизации и контроля процессов
Комплексная автоматизация ИТ-процессов
Manage IT & software assets for better compliance
Автоматизация подготовки, внесения исправлений и соответствия требованиям для всего ЦОД
Создавайте и масштабируйте безопасные автоматизированные бизнес-процессы на предприятии.
Получите всю информацию из массива больших данных за счет аналитики в режиме реального времени и поиска по неупорядоченным данным.
Здесь собраны все учебные ресурсы Micro Focus
Совершенствуйте навыки, которые помогут вам достичь успеха
Повышайте скорость работы, устраняйте препятствия и непрерывно совершенствуйте процесс доставки программного обеспечения
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Модернизируйте основные бизнес-системы, чтобы преобразовать свое предприятие.
Создавайте и модернизируйте бизнес-приложения с использованием современных технологий
The leading solution for COBOL application modernization
Модернизируйте мэйнфрейм-приложения IBM, процессы доставки, средства доступа и инфраструктуру.
Модернизация доступа приложений к хосту: проще, удобнее в интеграции и управлении, безопаснее
Достижение взаимодействия систем на уровне предприятия
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
Безопасность во всех направлениях деятельности: операциях, приложениях, идентификации и обработке данных
Безопасная разработка, тестирование параметров безопасности, непрерывный мониторинг и защита информации
Augment human intelligence
Шифрование, токенизация данных и управление ключами безопасности для деидентификации и сохранения конфиденциальности данных
Интегрированный подход к управлению идентификацией и доступом
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Определяет ранее известные и новые угрозы с помощью корреляции, приема данных и аналитики
Access all products in CyberRes
Надежные технологии обеспечения правовой защиты, соответствия нормам и соблюдения конфиденциальности
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Ускорьте свои ИТ-операции до скорости DevOps
Удобный пользовательский интерфейс и высокая эффективность работы службы поддержки основаны на технологии машинного самообучения
Первое контейнеризированное автономное решение для контроля работы гибридных ИТ
Автоматизация и управление для традиционных, виртуальных и программно-определяемых сетей
Обнаружение элементов конфигурации и управление ими в гибридных ИТ-средах.
Упрощение автоматизации и контроля процессов
Комплексная автоматизация ИТ-процессов
Manage IT & software assets for better compliance
Автоматизация подготовки, внесения исправлений и соответствия требованиям для всего ЦОД
Создавайте и масштабируйте безопасные автоматизированные бизнес-процессы на предприятии.
Access all products in IT Operations Management
Оформите собственную стратегию и преобразуйте свои гибридные ИТ-системы
Получите всю информацию из массива больших данных за счет аналитики в режиме реального времени и поиска по неупорядоченным данным.
Воспользуйтесь нашими образовательными услугами в сфере программного обеспечения, чтобы улучшить эффективность работы
The agency’s existing terminal emulation solution was old, nonsecure, and noncompliant with HSPD-12 security requirements. It needed a replacement solution flexible enough to meet its architectural needs and provide strong security
This particular federal agency is heavily reliant on a mainframe infrastructure integrated with close to 20 mission-critical applications. Over 40,000 individuals will access the mainframe daily. The agency has to comply with the HSPD-12 initiative1 , in particular multifactor authorization, FIPS 140-2, and TLS 1.2 encrypted communication. Also, as a shared resource, the mainframe is not under the agency’s direct control, so data encryption cannot be enabled. Data encryption on the mainframe would be controversial in any event, as the federal government has a continuous monitoring requirement that data encryption would inhibit. Instead, the agency relies on log files rather than inspecting the data itself.
The federal government is moving away from user ID and password combinations, which are inherently nonsecure. They are enforcing the use of multifactor authentication to access applications; i.e., a combination of a user PIV card and PIN code.
The agency’s existing terminal emulation solution was old, nonsecure, and noncompliant with HSPD-12 security requirements. It needed a replacement solution flexible enough to meet its architectural needs and provide strong security.
Managing X.509 security certificates directly on the mainframe is impractical. Certificates are linked to individuals and require maintenance and renewal, creating too much overhead with a user base of over 40,000 individuals.
With the advent of a serious security breach at the Office of Personnel Management (OPM) affecting over 22 million people, the federal government needs to enhance cybersecurity across its agencies. As part of a 30-day cybersecurity sprint, agencies were directed to further protect federal information, improve the resilience of their networks, immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems, and dramatically accelerate the use of strong authentication, especially for privileged users.
The agency looked for a repeatable, commercial solution, flexible enough to meet its unique demands. Micro Focus presented the Reflection family of products, which would leverage the existing Active Directory and PKI infrastructure. The agency can authenticate mainframe users with X.509 certificates from their smart cards and enforce this level of access. This tight access control for terminal sessions leverages multiple levels of security. Authentication and authorization takes place at the perimeter rather than on the mainframe itself. The Reflection security proxy is a true reverse proxy that leverages a JITC-certified token to ensure that TFA is enforced. The proxy also allows users to connect via TLS encryption and then is able to break that encryption behind the firewall to securely allow for content inspection of the data stream.
Once authenticated using their PIV card2 and PIN, users are automatically logged onto the mainframe with appropriate credentials. The solution provides seamless sign on to the mainframe without the user ever having to enter a password. This methodology provides a frictionless ease-of-adoption that agencies are striving to create for their end users as they implement more secure methods of access.
The agency has a long-term plan to eliminate Java from its browser environment and minimize the number of applications running on the desktop. They are pushing towards a centralized identity-based access solution that will allow centrally controlled access to mission-critical applications. It is now possible for them to do this with their mainframe applications.
The Reflection suite of products enabled the agency to leverage its current infrastructure and integrate this into a defined security framework. With Reflection, the agency can provide multifactor authentication in support of HSPD-12, meet continuous monitoring requirements, and eliminate passwords with complete single signon. The same security requirements can be applied across other platforms, providing a uniform approach across the agency. The solution also enables the agency to eventually transition to a Java-less browser environment.
An agency spokesperson concludes:
SPOKESPERSON
Federal Agency