尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Don’t let your terminal emulator put your network at risk. Here are the top five reasons to switch
to a highly secure emulator like Reflection 2011.
1.
Comply with PCI DSS
If your company processes credit card transactions, you’re probably familiar with the
requirements outlined in the PCI DSS standard, including masking cardholder data
and installing the latest vendor-supplied security patches.
These days, it’s essential to fully protect customer data on host systems. After all, data breaches
not only hurt your customers, but can mean heavy—even catastrophic—fines for your business.
Not all terminal emulators help you comply with the latest PCI DSS requirements—but Reflection
2011 does. New security features in Reflection allow you to mask data on live host screens,
redact data as it is entered, prevent users from connecting to host systems via wireless networks
and other non-secured configurations and protocols, log credit card data access by employees,
and define specific levels of data access for different user groups.
2.
Protect Data on Host Screens
Do you have sensitive data—such as U.S. social security numbers, driver’s license
numbers, and dates of birth—stored on IBM host screens? You can protect this data
using Reflection 2011’s patent-pending Privacy Filters features. And if you want to take security
to the next level, you can even prevent your users from copying data from a host screen to the
Windows clipboard to be shared with another application.
3.
Get the Latest SSL Encryption
If your organization transfers sensitive data over public and private networks, it could
be vulnerable to theft by hackers using network sniffing tools. You can mitigate this
risk with SSL/TLS and SSH technology that encrypts the data as it travels over the network.
Reflection 2011 includes the most up-to-date SSL/TLS and SSH security protocols that allow
you to protect your most valuable business data.
Did You Know?
•	 The average cost of an enterprise
data breach was $5.5 million in 2011.*
•	 Simple insider negligence is the 	
primary cause of most enterprise
data breaches.*
•	 Reflection 2011 is built to keep 	
sensitive data secure by preventing 	
it from leaving the host application. 	
*	 2011 Cost of Data Breach Study, Ponemon Institute
Top 5 Reasons to Switch to a
More Secure Emulator
Enterprises face more threats to their network security than ever before—from both inside and
outside the network. And with security breaches and insider fraud on the rise, many terminal
emulators just can’t keep up.
TopFive
If your terminal emulator doesn’t comply with the latest
security standards, your most sensitive customer and
business data could be left unprotected. Don’t let a
less secure emulator put your network at risk.
5
Contact your local Attachmate Solutions Provider,
or call Attachmate at:
1 800 872 2829 U.S./Canada
1 206 217 7500 Worldwide
Attachmate Corporate Headquarters
1500 Dexter Avenue North
Seattle, WA 98109 USA
© 2012 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, EXTRA!, and Reflection are registered trademarks of Attachmate
Corporation in the USA. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their
respective owners. 12-0019.0912
“Securing mission-critical host applications has
never been more important. Reflection’s ability
to mask sensitive data on host screens will help
us meet our PCI DSS compliance objectives and
provide us with new levels of critical security
for sensitive customer data.”
– Len De Kock,
manager of architecture and contracts IT,
AVBOB Mutual Assurance Society
www.attachmate.com
4.
Tame Macro Sprawl
Do you know where your macros are in the enterprise and what they do? If you don’t
know the answers to these questions, you’re exposed to a large, unknown risk.
All terminal emulation clients allow end users to record macros to automate their daily tasks.
But not all macros can be trusted. And deployment practices from years ago allow users to
easily share risky macros like these via email and sneaker-net.
To effectively manage macros and other automated tasks, choose a terminal emulator like
Reflection 2011 that allows granular controls, so that only trusted macros can be executed.
5.
Benefit from a Secure Development Lifecycle
Does your terminal emulation vendor use a well-documented Secure Development
Lifecycle to help protect you from security threats? At Attachmate, we make security
the number-one priority for each new release or update, and we have a dedicated security team
that oversees the development and certification of its security technologies. Security features
aren’t simple check-box items; instead, we perform intensive security testing and threat model-
ing in order to help maintain the integrity of your business applications.

More Related Content

What's hot

Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
200711 002
200711 002200711 002
200711 002
Nhựt Đình
 
Mbs r33 b
Mbs r33 bMbs r33 b
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Symantec
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
Jake Leonard
 
5G World 2019 - Security Workshop - Chairman's Remarks
5G World 2019 - Security Workshop - Chairman's Remarks 5G World 2019 - Security Workshop - Chairman's Remarks
5G World 2019 - Security Workshop - Chairman's Remarks
Paul Bradley
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017
Elsa Prieto
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the Datacenter
Ivanti
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
Kenny Buntinx
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
EC-Council
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
Symantec
 
ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
Alexander Rogan
 
Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdf
DivyeshMDesai
 
Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.
Mindtree Ltd.
 
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
Kenny Buntinx
 
Effective multi factor authentication for people soft
Effective multi factor authentication for people softEffective multi factor authentication for people soft
Effective multi factor authentication for people soft
Appsian
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
Ahmed Sallam
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder
ObserveIT
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
Mona Rajput
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
Fuji Xerox Singapore
 

What's hot (20)

Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
200711 002
200711 002200711 002
200711 002
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
5G World 2019 - Security Workshop - Chairman's Remarks
5G World 2019 - Security Workshop - Chairman's Remarks 5G World 2019 - Security Workshop - Chairman's Remarks
5G World 2019 - Security Workshop - Chairman's Remarks
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the Datacenter
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
 
Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdf
 
Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.
 
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
ECMDay2015 - Peter Daalmans – Master your Mac OS X Operating System with Conf...
 
Effective multi factor authentication for people soft
Effective multi factor authentication for people softEffective multi factor authentication for people soft
Effective multi factor authentication for people soft
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 

Similar to 120019_top5_security

110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp
Jessica Hirst
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
IBM Security
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015
Clint Walker
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
inside-BigData.com
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
Gaurav Ahluwalia
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
Peter Wood
 
Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17
LennartF
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
InishTech
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
Flexera
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
Jim Porell
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Procore Technologies
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
Salesforce Developers
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
DATA SECURITY SOLUTIONS
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Tony Pearson
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
Tony Pearson
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
MarketingArrowECS_CZ
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
Giuseppe Paterno'
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
Stuart Crawford
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 

Similar to 120019_top5_security (20)

110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 

120019_top5_security

  • 1. Don’t let your terminal emulator put your network at risk. Here are the top five reasons to switch to a highly secure emulator like Reflection 2011. 1. Comply with PCI DSS If your company processes credit card transactions, you’re probably familiar with the requirements outlined in the PCI DSS standard, including masking cardholder data and installing the latest vendor-supplied security patches. These days, it’s essential to fully protect customer data on host systems. After all, data breaches not only hurt your customers, but can mean heavy—even catastrophic—fines for your business. Not all terminal emulators help you comply with the latest PCI DSS requirements—but Reflection 2011 does. New security features in Reflection allow you to mask data on live host screens, redact data as it is entered, prevent users from connecting to host systems via wireless networks and other non-secured configurations and protocols, log credit card data access by employees, and define specific levels of data access for different user groups. 2. Protect Data on Host Screens Do you have sensitive data—such as U.S. social security numbers, driver’s license numbers, and dates of birth—stored on IBM host screens? You can protect this data using Reflection 2011’s patent-pending Privacy Filters features. And if you want to take security to the next level, you can even prevent your users from copying data from a host screen to the Windows clipboard to be shared with another application. 3. Get the Latest SSL Encryption If your organization transfers sensitive data over public and private networks, it could be vulnerable to theft by hackers using network sniffing tools. You can mitigate this risk with SSL/TLS and SSH technology that encrypts the data as it travels over the network. Reflection 2011 includes the most up-to-date SSL/TLS and SSH security protocols that allow you to protect your most valuable business data. Did You Know? • The average cost of an enterprise data breach was $5.5 million in 2011.* • Simple insider negligence is the primary cause of most enterprise data breaches.* • Reflection 2011 is built to keep sensitive data secure by preventing it from leaving the host application. * 2011 Cost of Data Breach Study, Ponemon Institute Top 5 Reasons to Switch to a More Secure Emulator Enterprises face more threats to their network security than ever before—from both inside and outside the network. And with security breaches and insider fraud on the rise, many terminal emulators just can’t keep up. TopFive If your terminal emulator doesn’t comply with the latest security standards, your most sensitive customer and business data could be left unprotected. Don’t let a less secure emulator put your network at risk. 5
  • 2. Contact your local Attachmate Solutions Provider, or call Attachmate at: 1 800 872 2829 U.S./Canada 1 206 217 7500 Worldwide Attachmate Corporate Headquarters 1500 Dexter Avenue North Seattle, WA 98109 USA © 2012 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, EXTRA!, and Reflection are registered trademarks of Attachmate Corporation in the USA. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 12-0019.0912 “Securing mission-critical host applications has never been more important. Reflection’s ability to mask sensitive data on host screens will help us meet our PCI DSS compliance objectives and provide us with new levels of critical security for sensitive customer data.” – Len De Kock, manager of architecture and contracts IT, AVBOB Mutual Assurance Society www.attachmate.com 4. Tame Macro Sprawl Do you know where your macros are in the enterprise and what they do? If you don’t know the answers to these questions, you’re exposed to a large, unknown risk. All terminal emulation clients allow end users to record macros to automate their daily tasks. But not all macros can be trusted. And deployment practices from years ago allow users to easily share risky macros like these via email and sneaker-net. To effectively manage macros and other automated tasks, choose a terminal emulator like Reflection 2011 that allows granular controls, so that only trusted macros can be executed. 5. Benefit from a Secure Development Lifecycle Does your terminal emulation vendor use a well-documented Secure Development Lifecycle to help protect you from security threats? At Attachmate, we make security the number-one priority for each new release or update, and we have a dedicated security team that oversees the development and certification of its security technologies. Security features aren’t simple check-box items; instead, we perform intensive security testing and threat model- ing in order to help maintain the integrity of your business applications.
  翻译: