Comparing Reflection Desktop and Reflection 14

Size: px
Start display at page:

Download "Comparing Reflection Desktop and Reflection 14"

Transcription

1 Micro Focus Desktop and 14 Comparing Desktop and 14 Desktop is the go-forward solution that replaces 14 products. Learn where you are missing out on great new features and where your business might be exposed to security issues. In addition to core terminal emulation, printing, file transfer, and automation capabilties, our Desktop product line provides enterprise customers with support for advanced security protocols and the latest Windows operating systems. Desktop has been designed to provide a seamless upgrade experience that carries forward session and user settings as-is. Supported Platforms Pre 14.1 Key Consideration(s) Desktop Operating Systems Microsoft Windows 10 Pro or Enterprise (32- and 64-bit) Certified Logo Windows 8.1 Professional or Enterprise (32- or 64-bit) Windows 7 Professional Enterprise or Ultimate (32- or 64-bit) Server Environments (Deployment and Virtualization) Windows Server 2016 Remote Desktop Services (RDS) Windows Server 2012 R2 and R1 Remote Desktop Services (RDS) Windows Server 2008 R2 Terminal Services Citrix Ready Logo Citrix XenApp version 6.x Citrix XenApp version 7.x* VMware Ready Logo VMware Workstation/Player VMware ThinApp Microsoft App-V Cloud Computing Deployment and Support Plan ahead for future desktop and server operating system upgrades Future innovation, optimization, and support for deploying desktop terminal emulation to IaaS (Infrastructure as a Service) and DaaS (Desktop as a Service) cloud platforms Secure Encryption Pre 14.1 Key Consideration(s) Transport Layer Security (TLS) 1.2 support Secure Shell (SSH) support SHA-2: Support for SHA-256/RSA-2048 digital signatures Feature available in this version * Supported on the above-supported Windows Server versions

2 Comparing Desktop and 14 Secure Encryption continued Pre 14.1 Key Consideration(s) Mouse over session status line padlock icon for detailed TLS/SSL information Online Certificate Revocation When making secure connections, check the authenticity of certificates using Online Certificate Status Protocol (OCSP), a faster alternative to checking Certificate Trust Lists (CTL). Secure Desktop Pre 14.1 Key Consideration(s) Trusted locations feature to secure desktop environment by allowing only trusted session files and macros to execute (specified location of session and macro files) Ability to encrypt session files Create custom Context Menus Ability to update deployed settings files User Account Control (UAC) Build Microsoft Installer (.msi) packages and lock down features Administrators can configure terminal emulation sessions to meet end user needs while locking down configurations to prevent unauthorized access. Data Privacy and Protection Pre 14.1 Key Consideration(s) Privacy filters to protect sensitive data PCI DSS mode to prevent unsecured connections to host systems (all networks, wireless networks) Support for protecting/masking sensitive data on IBM 3270 and 5250 screens Dynamic privacy filters to efficiently identify, filter and protect sensitive data Ability to ensure PCI DSS compliance for terminal emulation sessions Enforce secure connections over wireless network Make PAN data (credit card numbers) available to select users (e.g., managers) Prevent users from changing PAN settings with User Account Control (UAC) Ability to log when a user accesses a credit card number on an IBM (3270 or 5250) host screen via API (allowing for data capture in a third-party enterprise logging solution) Mainframe applications were designed long before privacy requirements and regulations. Organizations can now comply with privacy regulations and requirements (such as PCI DSS) without making any high cost and risky changes to their mainframe application or disrupting existing end user workflows to prevent sensitive information from being viewed, copied to the clipboard, and printed. Ease the Transition to Desktop Pre 14.1 Key Consideration(s) Retain existing 14 sessions and while gaining easier administration Use existing 14 session files without changes Deploy Classic interface to maintain 14 look and feel Run existing 14 macros and automations with Desktop Minimize disruption to end users by running existing Extra! configurations and macros in Desktop while providing users a familiar look and feel much like the experience of upgrading Microsoft Office. Simplified Administration Pre 14.1 Key Consideration(s) Compound settings files via Open Packaging Conventions (OPC) Support for compound configurations to include all customizations in single session file Ability to create individual settings files (sessions, macros, keyboards, etc.) for more flexible administration Desktop, unlike Extra!, provides one session file for multiple settings files, including keyboard, colors, file transfer, security, and connections that simplify administration. Feature available in this version 2

3 Comparing Desktop and 14 Authentication and Authorization Pre 14.1 Key Consideration(s) Support for Kerberos telnet authentication for TN5250 connections to the AS/400 (IBM System i) Support for IBM Express Logon Feature (ELF) enables certificate authentication and single sign-on (SSO) for mainframe sessions Use existing mainframe/host side authentication capabilities to secure access to host applications and data. Centralized Management Pre 14.1 Key Consideration(s) Authorization via legacy workflow Strong security requires the enterprise to control access to Seamless workflow to secure host access without disrupting end user productivity host applications and data, in addition to supporting regulatory compliance, without disrupting employee productivity. You can LDAP authentication enable strong security through effective management by Single Sign-On (SSO) for NTLM v2 teaming Desktop with Host Access Management and Security Server (MSS). Working with your Identity and Access Management (IAM) system, MSS seamlessly propagates changes to application settings and userspecific content from a central server. Require authentication to central server for user to use product Centralized certificate management for IBM host systems Host Access Management and Security Server (MSS) Add-Ons Security Proxy: Deliver end-to-end encryption and enforce access control at the perimeter with patented security technology SSH connections via the Security Proxy Add-On Advanced Authentication: Enable multifactor authentication to authorize access to your valuable host systems Automated Sign-On for Mainframe: Enable automated sign-on to IBM 3270 applications via your identity and access management system PKI Automated Sign-On: PKI-enable automated application sign-on to your critical enterprise systems Terminal ID Management: Dynamically allocate terminal IDs based on username, DNS name, IP address, or address pool Prevent unauthorized users from using terminal emulation by forcing authentication to MSS. As enterprises move to encrypting data in motion and validating senders and receivers, centralized management enables more secure and simpler management of server certificates. Add layers of security protection for your most sensitive systems and data. Standardization and Competitive Replacement Pre 14.1 Key Consideration(s) IBM Personal Communications (PComm) sessions and runtime support for PComm macros OpenText (Hummingbird) HostExplorer runtime support for Hummingbird macros Brandon Systems (Jolly Giant) QWS3270 runtime support for Jolly Giant macros Run Rumba sessions and macros Organizations looking to simplify administration and reduce costs are standardizing on a single terminal emulation solution. Now you can ease the transition to Desktop, saving time and reducing disruptions to user productivity. Feature available in this version 3

4 Comparing Desktop and 14 End User Productivity Pre 14.1 Key Consideration(s) Scan bar code data into host applications using Bluetooth (wireless) scanning devices Business-user-oriented macro language (Express Macro Language) for IBM hosts Screen History Quickpads, Hotspots, Auto-Complete, Auto-Expand and Spell-Check Visual terminal keyboard for accessing terminal keys Application, desktop, and Internet search support Support for opening new sessions in existing workspaces Triple-mouse-click support Word wrap support (IBM 3270 and 5250 only) Tabbed Multiple Document Interface (MDI) Microsoft Office Integration All Host Types to automate data exchange between host apps and Office Microsoft Office 2016 integration (32-bit and 64-bit) Microsoft Office 2013 and 2010 integration (32-bit and 64-bit) Bluetooth scanner support allows customers to use a wide array of bar code scanners to increase the mobility and efficiency of assembly line workers allowing them to directly enter data into mainframe applications. Empower end users to easily automate routine tasks increasing productivity without having to use a developer/ programmer. Drag and drop tool enables users to edit macros quickly and reduce errors. EML macros can be used without modification in Desktop, Rumba+ Desktop, ZFE, and InfoConnect Desktop. Implement modern features that enable users to be more productive when interacting with host applications. Use familiar Microsoft Office interfaces and features to make working with mainframe applications familiar and efficient. With Microsoft Office available on the system, you can enable users to leverage host data in messages, contacts, appointments, notes, tasks, and word-processing documents. User Interface Modernization Pre 14.1 Key Consideration(s) Plus mode UI modernization features: Button, Calendar, Image, and Tooltip Add modern time saving controls and look and feel to Plus mode UI modernization (full functionality available with add-on): Auto Execution, Checkbox, Chooser, IBM 3270 and IBM 5250 sessions to give workers a more Collector, Grid Collector, Input Field, Label, Radio Button, Tab, Table, and Web Frame intuitive and modern look and feel without making costly and disruptive changes to the application. Programming and Automation Pre 14.1 Key Consideration(s) Use existing Basic macros without changes N/A N/A Basic macro runtime and editing Command Language (RCL) macros support Customizations and integrations with other desktop applications Events Mapper for triggering actions based on events in host sessions with no coding required Organizations can continue to use existing Extra! macros and customizations in without the need to update or rewrite them. Using the Events Mapper, you can configure to initiate actions, such as macros, menu and terminal commands when an event is encountered during a host session. This makes it possible to monitor host interactions and synchronize commands with a defined group of host session events. Feature available in this version 4

5 Comparing Desktop and 14 Programming and Automation continued Pre 14.1 Key Consideration(s) Ability to programmatically interact/share information between a host session and a webpage Programmatic access to over 400 properties and methods via API HLLAPI, ehllapi, and WinHLLAPI (IBM 3270 and 5250) Visual Basic for Applications (VBA) Support Macro recorder for VBA VBA-macro output available in VB.NET and C# (.NET) VBA IDE (Integrated Development Environment) VBA-macro sharing Microsoft.NET Native.NET API Embeddable.NET control Integration between.net API and Microsoft Visual Studio IDE API documentation with detailed walkthroughs on how to use the API with.net Easily customize and integrate with other desktop applications. Programmers familiar with Microsoft Visual Basic for Applications (VBA) can customize and automate common tasks using methods, properties, and events that extend the core Visual Basic language. Create custom desktop applications in a.net development environment using the Micro Focus API. The.NET Framework is the Microsoft managed-code technology used for building applications that have visually stunning user experiences, seamless and secure communication, and the ability to model a range of business processes. User Interface Modes Pre 14.1 Key Consideration(s) TouchUx for optimal user experience when interacting with host applications from touch devices Browser Ribbon Classic Customizable Ribbon Tabbed or windowed Multiple Document Interface (MDI) for sessions Configurable tabs, including colors, renaming, and more Local and online HTML Help Enable TouchUx to give ios, Android, and Windows mobile-device users a familiar data input experience. Provide browser look and feel that maximizes screen real estate and minimizes window dressings and clutter. The Ribbon interface shares the look and feel of modern Windows and Microsoft Office. A Classic interface option provides an experience that is familiar to users of Customize the user interface to best suit the needs of user population. International Support Pre 14.1 Key Consideration(s) German, French, Spanish, Italian, Portuguese localization Support for Chinese Simplified/Traditional, Korean, and Japanese code pages Double Byte Character Support (DBCS) enabled Japanese localization Feature available in this version Multi-national organizations can standardize on a single terminal emulation solution across all regions of the world. 5

6 Micro Focus UK Headquarters United Kingdom +44 (0) U.S. Headquarters Rockville, Maryland Additional contact information and office locations: A 03/ Micro Focus. All rights reserved. Micro Focus, the Micro Focus logo, Extra!, and, among others, are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.

Comparing Reflection Desktop and Extra! X-treme

Comparing Reflection Desktop and Extra! X-treme Micro Focus and Extra! X-treme Comparing and We ve combined the features of Extra! and into to give you the most advanced Windows terminal emulator in the market. In addition to core terminal emulation,

More information

Micro Focus lnfoconnect MICRO FOCUS

Micro Focus lnfoconnect MICRO FOCUS Micro Focus lnfoconnect O MICRO FOCUS If you need terminal emulation, and you like InfoConnect classic editions......you re going to love InfoConnect Desktop Pro! Upgrading from InfoConnect classic editions

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Getting Started with Reflection Desktop Deployment

Getting Started with Reflection Desktop Deployment Getting Started with Reflection Desktop Deployment Deploying Reflection Desktop You can choose from several different approaches for installing and deploying Reflection Desktop. Deciding which approach

More information

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( ) Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Reflection Desktop Deployment Guide. Version 16.0

Reflection Desktop Deployment Guide. Version 16.0 Reflection Desktop Deployment Guide Version 16.0 Copyrights and Notices Reflection Desktop Copyright 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation

More information

Installation and Deployment Guide InfoConnect Desktop. Version 16.0

Installation and Deployment Guide InfoConnect Desktop. Version 16.0 Installation and Deployment Guide InfoConnect Desktop Version 16.0 Copyrights and Notices 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Automated Sign-on for Mainframe Administrator Guide

Automated Sign-on for Mainframe Administrator Guide Automated Sign-on for Mainframe Administrator Guide 12.5.1 For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,

More information

Solutions Business Manager Web Application Security Assessment

Solutions Business Manager Web Application Security Assessment White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK Rumba 9.4.1 Readme Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1984-2016. All rights reserved. MICRO FOCUS, the Micro Focus logo

More information

Avaya Desktop Collector Snap-in R GA Release Notes

Avaya Desktop Collector Snap-in R GA Release Notes Avaya Desktop Collector Snap-in R3.3.0.0.0 GA Release Notes 07 July 2017 1 Contents 1. Document changes... 3 2. Introduction... 4 3. Feature Descriptions... 6 4. Desktop Agent Widget in Oceana Workspaces...

More information

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Programming Announcement September 28, 2004 IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Overview

More information

CipherPost Pro. Secure communications simplified. Feature Sheet

CipherPost Pro. Secure communications simplified. Feature Sheet Feature Sheet CipherPost Pro Secure communications simplified CipherPost Pro is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Rumba+ Desktop 9.5 SP1. Readme

Rumba+ Desktop 9.5 SP1. Readme Rumba+ Desktop 9.5 SP1 Readme Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1984-2017. All rights reserved. MICRO FOCUS, the Micro

More information

Alcatel-Lucent OpenTouch Conversation applications

Alcatel-Lucent OpenTouch Conversation applications Data Sheet Alcatel-Lucent OpenTouch Conversation applications The Alcatel-Lucent OpenTouch Communications Suite transforms enterprise communications into collaborative conversations and business services.

More information

Dell Wyse ThinLinux Version for Wyse 5070 thin client

Dell Wyse ThinLinux Version for Wyse 5070 thin client 2018-08 Dell Wyse ThinLinux Version 2.0.27 for Wyse 5070 thin client Software releases are created to correct defects, make enhancements, or add new features. These releases are tested on all current,

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer 1 BIG-IP APM: Access Policy Manager v11 David Perodin Field Systems Engineer 3 Overview What is BIG-IP Access Policy Manager (APM)? How APM protects organization-facing applications by providing policy-based,

More information

Attachmate EXTRA! X-treme Evaluator s Guide

Attachmate EXTRA! X-treme Evaluator s Guide Attachmate EXTRA! X-treme Evaluator s Guide Attachmate EXTRA! X-treme Evaluator s Guide CONTENTS Introduction... 2 About this Guide... 2 Product Overview... 2 Getting Started... 2 Configure Spell-check

More information

A comprehensive security solution for enhanced mobility and productivity

A comprehensive security solution for enhanced mobility and productivity A comprehensive security solution for enhanced mobility and productivity coupled with NetScaler Unified Gateway and StoreFront lets organizations upgrade their business security beyond usernames and passwords,

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview AKAMAI WHITE PAPER Enterprise Application Access Architecture Overview Enterprise Application Access Architecture Overview 1 Providing secure remote access is a core requirement for all businesses. Though

More information

REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS

REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS IT Challenges AT THE REMOTE OFFICE Compared to data centers, remote offices and facilities pose unique hardware and IT management

More information

Micro Focus Developer Kit

Micro Focus Developer Kit data sheet Micro Focus Developer Kit Leverage existing host applications in creating new business solutions with our comprehensive development tools The Micro Focus Developer Kit is a comprehensive set

More information

Digital Workspace SHOWDOWN

Digital Workspace SHOWDOWN Digital Workspace SHOWDOWN Why Citrix Workspace is a better choice than VMware Workspace ONE Take a closer look at the dozen ways that Citrix Workspace outperforms VMware Workspace ONE. Today s workers

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper Filr An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Filr Competitive Differentiators...2 Filr High-Level

More information

Secure communications simplified

Secure communications simplified Secure communications simplified Cirius is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated organizations to effectively protect,

More information

SEPARATING WORK AND PERSONAL

SEPARATING WORK AND PERSONAL SEPARATING WORK AND PERSONAL How Balance Works at the Platform Level Whitepaper 2 Why balance matters in enterprise mobility As more and more business processes go mobile, IT faces an ever-increasing number

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

TECHNICAL DESCRIPTION

TECHNICAL DESCRIPTION TECHNICAL DESCRIPTION Product Snow Inventory Version 5 Release date 2016-09-27 Document date 2017-11-24 CONTENTS 1 Introduction... 3 1.1 What s new?... 3 2 Platform overview... 4 2.1 Architecture... 4

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

Reflection X Advantage Reflection X Advantage Help. Date

Reflection X Advantage Reflection X Advantage Help. Date Reflection X Advantage Reflection X Advantage Help Date Copyrights and Notices Attachmate Reflection 2017 Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the

More information

Enterprise solution comparison chart

Enterprise solution comparison chart Enterprise solution comparison chart This quick reference compares supported and features across, Enterprise Service,, and. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs

More information

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service DATASHEET VMWARE 7 AT A GLANCE 7 delivers virtualized or hosted desktops and applications through a single platform to end users. These desktop and application services including Remote Desktop Services

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE Table of Contents Component Design: VMware Identity Manager Architecture Design Overview VMware Identity Manager Connector

More information

Azure MFA Integration with NetScaler

Azure MFA Integration with NetScaler Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Scaling for the Enterprise

Scaling for the Enterprise White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...

More information

Dell Wyse Management Suite 1.3 Release Notes

Dell Wyse Management Suite 1.3 Release Notes Rev. A00 2018-10 Dell recommends applying this update during your next scheduled release cycle. The update contains feature enhancements or changes that will help keep your system software current and

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018 REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

HiveManager Local Cloud

HiveManager Local Cloud DATA SHEET HiveManager Local Cloud Enterprise Access Network Management Offering Intuitive Configuration Workflows, Real-Time & Historical Monitoring, and Simplified Troubleshooting DATASHEET HiveManager

More information

Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1

Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1 Setting Up Resources in VMware Identity Manager 3.1 (On Premises) Modified JUL 2018 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

AirWatch Container. VMware Workspace ONE UEM

AirWatch Container. VMware Workspace ONE UEM VMware Workspace ONE UEM You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

AT&T Toggle. 2/3/2014 Page i

AT&T Toggle. 2/3/2014 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T

More information

Wyse Converter for PCs 1.1 Release Notes

Wyse Converter for PCs 1.1 Release Notes 2018-09 Software releases are created to correct defects, make enhancements, or add new features. These releases are tested on all current, actively shipping platforms and operating systems, as applicable.

More information

Wyse Converter for PCs Release Notes

Wyse Converter for PCs Release Notes 2018-04 Software releases are created to correct defects, make enhancements, or add new features. These releases are tested on all current, actively shipping platforms and operating systems as applicable.

More information

Rocket Passport PC to Host Overview

Rocket Passport PC to Host Overview Rocket Passport PC to Host Overview Would saving up to 80% on terminal emulation be of interest to you? Of course, it would. That's one reason why you need to seriously consider Rocket Passport. Terminal

More information

Solutions Business Manager. Path to Production for Enterprises

Solutions Business Manager. Path to Production for Enterprises White Paper Solutions Business Manager Solutions Business Manager Path to Production for Enterprises Table of Contents Introduction to the Solutions Business Manager Development Process... 1 The Path to

More information

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK Rumba 9.4 Readme Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1984-2015. All rights reserved. MICRO FOCUS, the Micro Focus logo

More information

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity

More information

Achieving Network Storage Optimization, Security, and Compliance Using File Reporter

Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Information Management & Governance Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Table of Contents page Detailed Network Storage File Reporting and Analysis...2

More information

MOBILIZE YOUR ENTERPRISE WITH TELERIK SOLUTIONS

MOBILIZE YOUR ENTERPRISE WITH TELERIK SOLUTIONS MOBILIZE YOUR ENTERPRISE WITH TELERIK SOLUTIONS Work doesn t just happen in the office. Technology is changing the way organizations operate. Today s business environment requires your employees to take

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2 VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Agility 2018 Hands-on Lab Guide. VDI the F5 Way. F5 Networks, Inc.

Agility 2018 Hands-on Lab Guide. VDI the F5 Way. F5 Networks, Inc. Agility 2018 Hands-on Lab Guide VDI the F5 Way F5 Networks, Inc. 2 Contents 1 Lab1 - Getting Started 5 1.1 Jump Host.............................................. 5 1.2 Lab Network Setup.........................................

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

Cisco UCS Central Software

Cisco UCS Central Software Data Sheet Cisco UCS Central Software Cisco Unified Computing System Multidomain Management Efficient management of distributed servers continues to be a challenge whether you have a handful of systems

More information

Solution overview VISUAL COBOL BUSINESS CHALLENGE SOLUTION OVERVIEW BUSINESS BENEFIT

Solution overview VISUAL COBOL BUSINESS CHALLENGE SOLUTION OVERVIEW BUSINESS BENEFIT BUSINESS CHALLENGE There is an increasing demand from users of business software for easier to use applications which integrate with other business systems. As a result IT organizations are being asked

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE Table of contents 3 How a UCaaS platform empowers your mobile workforce with a phone system and much more 4 6 11 A cloud phone

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Delivers cost savings, high definition display, and supercharged sharing

Delivers cost savings, high definition display, and supercharged sharing TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise

More information

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK

Micro Focus The Lawn Old Bath Road Newbury, Berkshire RG14 1QN UK Rumba 9.3 Readme Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1984-2014. All rights reserved. MICRO FOCUS, the Micro Focus logo

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs. Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

EBOOK. Mobile Experience Virtualization: Extend Virtualized Windows Apps to Mobile

EBOOK. Mobile Experience Virtualization: Extend Virtualized Windows Apps to Mobile EBOOK Mobile Experience Virtualization: Extend Virtualized Windows Apps to Mobile Table of Contents The Mobilization Dilemma Mobile User Experience Virtualization is not Mobilization Mobile Experience

More information

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better

More information

LEVEL 3 SM WEB MEETING

LEVEL 3 SM WEB MEETING LEVEL 3 SM WEB MEETING REAL-TIME, INTUITIVE, ROBUST COLLABORATION AT YOUR FINGERTIPS JANUARY 2017 Today, organizations are finding that rudimentary web conferencing applications are inadequate and frustrating

More information

SharePoint Management

SharePoint  Management SharePoint Email Management Use these feature checklists to guide and structure your evaluation of available products for SharePoint-based email management. They show the features that are available in

More information