Federal Government

For federal government IT staffs, finding new ways for workers and partners to securely access the data they need is a top priority. Recent FISMA, HSPD-12, and DoDI 8520.2 activity—along with big government investments in mobile and cloud technologies—make that clear. But unlocking backend legacy systems, which house much of your data, is tricky. So is balancing access with security.

Micro Focus can help—with proven software and an experienced federal government team in Vienna, VA, that is dedicated to your needs.
8609 Westwood Center Drive, Suite 700
703.663.5500
Benefits
PIV-enable terminal applications

Satisfying HSPD-12 requirements in legacy host environments isn't easy. Legacy applications were never designed to fit into today's IT security architectures. Even so, you can apply modern, multilayered security to traditional green-screen applications—including two-factor authentication for mainframe applications—without recoding. Our innovative COTS solutions, specifically designed for agencies in the U.S. federal government, make it possible.

Cloud-enable terminal applications

Take a zero-impact approach to integrating legacy assets with the cloud. Safely expose and encapsulate legacy data as reusable services for use within new or existing workflows—no recoding required. Map only those areas of the application needed for the desired transaction. With our solutions, you can move your legacy systems into the 21st century.

Enable mobile-to-mainframe access

Allow employees and partners to connect to critical legacy applications from their iPads and Android devices. Personalize the format for optimal productivity. Streamline workflows and navigation. Reduce input errors by controlling input values. You can do it now, without any recoding.

Webcast: Moving to Mobile Enterprise Applications with Verastream

Manage file transfers and secure file lifecycles

Centrally provision, automate, track, log, audit, and troubleshoot internal and external transfers. Ensure safe delivery by enforcing secure protocol versions (SSHv2 and TLSv1.2), cipher suite and key lengths (AES256 and SHA-2), and FIPS 140-2 requirements across diverse client and server platforms. With our suite of managed file transfer solutions, you can even automate the complete lifecycle of user and group files using your current identity management system.

What Our Customers Say
Pentagon Federal Credit Union
Laurie Horstmann
eCommerce Manager, Financial Technologies

"Attachmate (now a part of Micro Focus) provided a cost effective solution that took advantage of existing mainframe application flow and screens. We are re-using business logic on our legacy system, so there are many benefits."

Defense Information Systems Agency
Judith A. Janney
Support Branch, Infrastructure Division, Computing Services

"As an IT professional who has worked with federal software vendors for over thirty years, this is the first time I have experienced customer support that went above and beyond the call of duty."

"With Attachmate's (now a part of Micro Focus) dedicated and timely efforts, we have successfully accomplished our mission to migrate over 50,000 users to the Multi-Host Internet Access Portal (Reflection Security Gateway) and eliminate IBM Host on Demand from our software inventory. Our customers, both in the private sector and at the Department of Defense, are now able to access critical applications in both a secure and reliable manner."

Product Portfolio
Host Access Management and Security Server (MSS)
Micro Focus Host Access Management and Security Server works with your Identity and Access Management (IAM) system to centrally manage and secure Reflection, Extra!, Rumba+, and InfoConnect terminal emulation sessions.
System Req › How to Buy ›
An MSS add-on that uses patented security technology to deliver end-to-end encryption and enforce access control at the perimeter.
System Req › How to Buy ›
An MSS add-on that enables multifactor authentication to authorize access to your valuable host systems.
System Req › How to Buy ›
An MSS add-on that enables automated sign-on to IBM 3270 applications via your identity and access management systems.
System Req › How to Buy ›
An MSS add-on that dynamically allocates terminal IDs based on username, DNS name, IP address, or address pool.
System Req › How to Buy ›
Micro Focus Reflection for Secure IT is a family of Secure Shell clients and servers for Windows and UNIX—all designed to protect data in motion. With these products, you can safely transfer sensitive data, manage remote servers, and access corporate applications over encrypted connections.
How to Buy ›
Micro Focus Reflection Desktop is a Windows-based family of terminal emulators that gives users anywhere, anytime access to IBM, UNIX, Linux, OpenVMS, HP, and X11 hosts from their desktops or mobile devices.
How to Buy ›
An MSS add-on that dynamically allocates terminal IDs based on username, DNS name, IP address, or address pool.
How to Buy ›
Cloud-enable terminal applications
Micro Focus Verastream is a family of solutions that frees up mainframe assets for quick reuse in today’s business projects, including mobile apps, web applications, and SOA web services for internal and cloud initiatives. Whether you need basic rejuvenation, custom presentations, or sophisticated high-performance integration, Verastream has you covered.
Micro Focus iPrint is printing software that allows users to print from their iOS, Android, and Blackberry devices, as well as their Windows laptops. Users just download the free app and start printing.
System Req › How to Buy ›
Enable mobile-to-mainframe access
Micro Focus Verastream Host Integrator is a powerful integration platform that puts mainframe assets to work in new ways—as mobile apps, web applications, and SOA web services for internal and cloud initiatives.
System Req › How to Buy › Trial Download ›
Micro Focus ZENworks Mobile Management Suite is device-management software that allows IT to seamlessly manage both enterprise-owned and personal (BYOD) devices. With ZENworks Mobile Management Suite, you can ensure that all mobile devices adhere to corporate security policies--giving you the control you need to protect your data
System Req › How to Buy ›
Want to know more? We’re here to help.