Attachmate Extends Modern Security to Legacy Applications with Reflection Security Gateway 2014

16 October 2013

Attachmate Corporation,, announced today the launch of Attachmate® Reflection® Security Gateway 2014, a new software product designed to help address the problem of integrating host systems with modern security infrastructure. Reflection Security Gateway leverages mature, proven and patented technology to extend an enterprise’s authentication and identity management investments to their access controls for host systems.

“Until now, nobody has effectively solved the problem of extending modern access control technologies, such as enterprise identity management and strong authentication, to host application access,” said Sam Morris, director of product marketing and product management at Attachmate. “Reflection Security Gateway provides organizations with a combined set of management and security capabilities unparalleled by any other emulation vendor in the market.”

In addition to its access control capabilities, Reflection Security Gateway provides capabilities that assist IT desktop managers in their efforts to manage and maintain their terminal emulation environment. As more IT desktop and security managers face migrations from the Windows XP operating system, new technologies that drive down the cost of those migrations, both during and after, are critical. In particular, for enterprises with broad deployments of terminal emulation clients, Reflection Security Gateway is changing how organizations manage and secure their host access environments while realizing greater ROI on their host access and modern security investments.

Reflection Security Gateway 2014 enables Attachmate’s terminal emulation customers to:

  • Reduce risk by extending enterprise identity management technologies to host application access.
  • Reduce the cost of managing the terminal emulation software that sits on hundreds or even thousands of desktops in the enterprise.
  • Improve the efficiency of migrations from the Windows XP operating system by making it easy to push terminal emulation configurations to multiple desktops.

“Many organizations and IT departments are facing disruption and cost implications with the end of life of the Windows XP operating system and need to migrate their terminal emulation clients to the new desktop platform,” said Morris. “These organizations are looking for ways to make their new desktop environment easier and less costly to manage. By centralizing the management of terminal emulation configurations and integrating with the enterprise user directory, Reflection Security Gateway gives desktop managers a more efficient way to deliver host sessions to user desktops. This results in a lower TCO for their new desktops. It is truly powerful.”

Desktop Management Benefits

With Reflection Security Gateway 2014, IT desktop managers will benefit from centralized management capabilities that simplify the process of pushing terminal emulation configuration changes out to the desktop. The product offers two major desktop management features that save valuable time:

  • Centralized session deployment, which enables users to launch desktop emulation sessions from a centrally administered location, allowing changes to those sessions to happen in one place. All users with access to that session receive those changes the next time they launch the session.
  • Configuration package deployment that allows administrators to easily deploy packages of emulation content, such as keyboard maps and macros down to user desktops, all from a central location.



Security Benefits

Reflection Security Gateway provides IT security managers with access control capabilities that extend enterprise identity management and authentication technologies to host access in combination with session-level access control enforcement. The top Security features include:

  • Centralized identity management, which requires a user to first authenticate to Reflection Security Gateway before accessing a host. This validates the user’s credentials using the organization’s existing authentication infrastructure. Security managers are able to extend their enterprise authentication technologies out to their host systems accessed via Attachmate terminal emulators.
  • Centralized access control, whereby Reflection Security Gateway verifies that the administrator has granted a user access to the host session before allowing the session. Since access rights can be controlled through LDAP group membership, security managers are able to extend their existing enterprise identity management infrastructure to access control to host systems.
  • Enforcement of access control at the perimeter which uses Attachmate’s patented secure token authorization technology to verify that the user is authorized to connect to the host. With Reflection Security Gateway, users who have not been authorized through the enterprise directory cannot connect to the host.

By extending the reach of their modern security infrastructure to legacy host systems, security managers are able to more consistently apply access control policy across their organization and drive more value into their access control technology investments.

For more information about Reflection Security Gateway, please visit

About Attachmate Corporation

For 30 years, Attachmate has been delivering essential business information to the right users, in the right formats, via the right devices. Today, Attachmate software runs on 19 million desktops and mobile devices—across industries ranging from financial services, healthcare, and government to retail, travel, and manufacturing. Built to integrate existing systems and emerging technologies, our products help organizations worldwide put their IT assets to work in new and meaningful ways.

Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.