BMC Discovery o ADDM, una soluzione agentless

BMC Discovery o ADDM, una soluzione agentless

BMC Discovery e’ uno strumento estremamente efficiente, se non indispensabile, per condurre in maniera immediata ed aggiornata studi di Risk assessment (o risk analysis) e di business impact analysis
Mappa accuratamente le applicazioni e le connessioni in pochi minuti:

  • Riduce le interruzioni del servizio grazie alla possibilità di prevedere e gestire i cambiamenti di configurazione.
  • Effettua una mappatura completa delle informazioni software, hardware, di rete e di storage.
  • Migliora i criteri di sicurezza con un inventario documentato al fine di soddisfare i requisiti di conformità.
  • Dismette o consolida gli asset in modo riservato capendo le relazioni e l’impatto sul business.

La soluzione è agentless, infatti BMC Discovery è un’appliance virtuale pronta da usare. Il deploy richiede pochi minuti. Non c’è alcun processo di installazione, nessun database esterno da installare e configurare e nessun requisito di configurazione o di sistema operativo da rispettare.
Sotto il profilo della sicurezza, BMC Discovery utilizza standard di sicurezza certificati. L’applicazione virtuale infatti supporta FIPS 140-2 e rispetta NIST STIG.
Infine BMC Discovery si integra con qualunque CMDB oltre ad avere una integrazione nativa con il CMDB di BMC Remedy.
A corredo del pacchetto base sono disponibili due add-on opzionali:

  • Extended Data Pack: che gestisce la end-of-life del supporto del software e dell’hardware al fine di evitare problemi di upgrade per software non più supportati o evitare inefficienze del hardware.
  • Discovery for Storage: permette di includere nei processi ITSM componenenti storage di 25 brand diversi sia virtuali sia fisici. In questo modo il team di gestione può concentrarsi su una attività con connotati più strategici.

 

 

VMware

VMware

VMware has grown from five technologists working in a small apartment, to a leading innovator in enterprise software. Today the company’s compute, cloud, mobility, networking, and security offerings provide a dynamic and efficient digital foundation to over 500,000 customers globally. VMware technologies have fundamentally changed IT, and with it, the possibilities open to business. Now VMware and its customers have the freedom to build their own digital futures.

Digital Workspace
Make it easy for employees to work anywhere, any time, on any device, without compromising security.

Open/Close all the descriptions
>

Workspace ONE

Intelligence-driven digital workspace platform that delivers and manages any app on any device

Deliver an Engaging Employee Experience with an Intelligence-driven Digital Workspace Platform
Simply and securely deliver and manage any app on any device with VMware Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment.

What Workspace ONE Delivers

Engaging Employee Experiences From Onboarding to Offboarding
Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device.
Unified Endpoint Management
Consolidate management silos across mobile devices, desktops (including Windows 10 and macOS), rugged devices and “things”. Reduce costs and improve security with real-time, over-the-air modern management across all use cases (including BYO).
Intelligence Across the Digital Workspace
Aggregate and correlate data across your entire digital workspace to drive insights, analytics and powerful automation of common IT tasks that improve user experience, strengthen security and reduce IT cost.
Virtual Desktops and Apps
Radically transform traditional VDI and published apps with integrated VMware Horizon and VMware Horizon Cloud, which provides unprecedented simplicity, flexibility, speed and scale – all at a lower cost. A common control plane across the “multi-cloud” enables an architecture and cost model to meet your requirements.
Secure and Simple Application Access
Boost productivity and delight employees with secure, password-free single sign-on (SSO) to SaaS, mobile, Windows, virtual and web apps on any phone, tablet or laptop — all through a single app catalog.
Simplify Zero Trust Security
Combine intrinsic security across device, users, and apps to simplify the enablement of Zero Trust access control. Industry-leading modern management of all devices and access management across all applications makes zero trust access models a reality.

Workspace ONE UEM Powered by AirWatch

Unified endpoint management (UEM) technology that powers Workspace ONE
Manage Every Device and Every Use Case with Unified Endpoint Management
Reduce costs and improve security with modern, over-the-air management of every endpoint – including desktops, mobile, rugged, and IoT – and ensure enterprise security at every layer with Workspace ONE UEM, powered by AirWatch technology.

What Workspace ONE Unified Endpoint Management (UEM) Does
Unifies Endpoint Management
Manage the full lifecycle of any endpoint – mobile (Android, iOS), desktop (Windows 10, macOS, Chrome OS), rugged and even IoT (Linux and others) – in a single management console. Support all your mobility use cases: corporate-owned, BYOD, purpose-built or shared devices.
Modernizes Desktop Management
Optimize desktop OS (Windows 10, macOS, Chrome OS) lifecycle management for a mobile world. The most complete, modern management technology simplifies deployment, provides 100% cloud policy management, streamlines app delivery, automates patching and ensures security.
Automates Processes and Delivers Intelligent Insights
Leverage powerful insights and rules-based automation to optimize employee digital experience, ease the strain on IT and get to a proactive management and security model. Learn more about our intelligence-driven digital workspace platform.
Protects Corporate Apps and Data on Any Network
Provide an intrinsic and comprehensive security approach that encompasses the user, endpoint, app, data and network. Conditional access and granular compliance policies protect company data and ensure hands-free, instant remediation against modern day security threats.
Improves Employee Productivity
Deliver frictionless and secure access to all your business apps – mobile, desktop, SaaS, virtual. The apps include VMware Workspace ONE secure mobile productivity apps – catalog, email, calendar, contacts, web browser, notes, content and more.
Powers Your Digital Workspace
Unified Endpoint Management technology is an essential element in delivering on the promise of a complete digital workspace that reduces IT costs, bolsters security and proactively improves employees’ digital experience.

Workspace ONE UEM Key Highlights

  • Cloud-first, multitenant model to support and better control growing business requirements
  • Real-time desktop modern management from cloud, enhanced with Intelligence automation
  • Automate Windows 10 modern management migration with Workspace ONE AirLift
  • Special purpose mobility with support for ruggedized devices, wearables and IoT
  • Secure Microsoft Office 365 with MAM and conditional access policies across all OS
  • Remote wipe compromised devices instantly to remove sensitive company data
  • Enterprise-grade security fit for government agencies and regulated industries
  • Unified app catalog for one-touch, secure access to any app across any device
  • Robust API framework to support enterprise systems, services, identity, apps, content

VMware Carbon Black Cloud

Transform your security with intelligent endpoint and workload protection that adapts to your needs.

Transform your security with intelligent endpoint and workload protection that adapts to your needs.

Advanced Cybersecurity Fueled by Behavioral Analytics

Cloud native endpoint, workload, and container protection platform that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single, easy-to-use console. By analyzing more than 1 trillion security events per day, VMware Carbon Black Cloud proactively uncovers attackers’ behavior patterns and empowers defenders to detect and stop emerging attacks.

Modernize Your Endpoint Protection
Legacy approaches to prevention leave organizations exposed. Cybercriminals constantly update tactics and obscure their actions within common tools and processes. You need an endpoint platform that helps you spot the minor fluctuations that hide malicious attacks and adapt prevention in response.

Attackers Bypass Traditional Endpoint Security
Most of today’s cyberattacks now encompass tactics such as lateral movement, island hopping and destructive attacks. Advanced hacking capabilities and services for sale on the dark web compound the issue. These realities pose a tremendous risk to targets with decentralized systems protecting high-value assets, including money, intellectual property, and state secrets.

Recognizing the Good, the Bad and the Gray
While other endpoint security products only collect a dataset related to what is known bad, we continuously collect endpoint activity data because attackers intentionally try to look normal to hide their attacks. Analyze attackers’ behavior patterns to detect and stop never-seen-before attacks.

Simplify Your Security Stack
VMware Carbon Black Cloud consolidates multiple endpoint security capabilities using one endpoint agent and console, cutting the management headaches and console thrashing required when responding to potential incidents. Minimize downtime responding to incidents and return critical CPU cycles back to the business.

Wandera

Wandera

The Wandera team are proven innovators in enterprise cloud services and security. The team founded ScanSafe (now part of Cisco), pioneer of the cloud secure web gateway market and trusted provider to thousands of global enterprises.
The same passion for innovation and focus on customer experience is behind Wandera and the design of our unique transparent gateway architecture. They are excited to help their customers navigate the next generation of enterprise mobility challenges beyond traditional EMM. Recognized by Gartner as a Cool Vendor, and by Computing for Mobile Security Vendor Excellence.

 

Wandera

Open/Close all the descriptions

Security & Management for your Mobile Data

The explosion of billions of mobile devices has created the largest technology footprint for hackers to steal corporate and personal data. At the same time, the escalation of app creation and video content, together with the adoption of 4G, means the demand for data has grown exponentially. Businesses are suffering because they cannot protect, predict or control mobile data.
Wandera helps enterprises prevent threats, enforce policy, all while reducing mobile data usage.

The true strength of the architecture is the ability for administrators to take action using automated policy controls,
including alerts, filters, blocks, caps, and device quarantining to prevent security threats, ensure compliance and manage usage.

The core solution is Wandera’s industry leading protection against the full spectrum of mobile attacks. From device configuration risks, insecure app vulnerabilities, malicious infrastructure and traditional network attacks, Wandera prevents threats in real-time.

Wandera + Airwatch Integration

Wandera and Airwatch partner to provide seamlessly integrated mobile threat prevention

Wandera’s Mobile Data Gateway (MDG) and Enterprise Mobility Management (EMM) suites are becoming central components in enterprise mobility strategies. These two entities combined provide the most comprehensive device and data management capabilities for mobile environments to date. With each picking up where the other leaves off, the two systems work in conjunction with each other to provide unmatched device management, visibility, security, and control.
EMM suites focus on device-level management, which is more persistent in nature. This includes the ability to set policies for password requirements, identity management, network enablement and app distribution.

Wandera’s EMM Connect solution enables deep integration between the Wandera Mobile Data Gateway and AirWatch. By linking the two entities together, an enterprise can realize maximum management efficiency, unified threat outbreak response, and multi-level policy based controls

Wandera Private Access

Wandera introduces ZTNA security solution that’s four times faster than VPNs.

Wandera Private Access (WPA) is a cloud-delivered service that provides secure remote access to applications hosted in the datacenter or in the cloud, using Zero Trust Network Access (ZTNA) principles.

Wandera Private Access empowers secure remote work and offers a seamless and consistent user experience from any connected device (running iOS, Android, Windows 10, and Mac) to any application wherever it is hosted. It eliminates the broad discoverability and reachability of data and apps that users shouldn’t have access to, and dramatically increases visibility for admins as well as their ability to take action.

Further, WPA provides teams the flexibility to work any time, anywhere by connecting them to the applications they need. Streamlined authentication processes improve security and enable fast seamless remote working.

WPA is a cloud-based service that requires no on-premise equipment and the service edge dynamically scales to handle unlimited client connections.

 

VMWare Workspace ONE

VMWare Workspace ONE

La rapida adozione di nuove e moderne applicazioni (SaaS app, mobile app) accoppiata con la proliferazione di potenti e affidabili dispositivi mobile ha introdotto nuove sfide nell’ambiente lavorativo.
Al fine di essere produttivi in ogni momento e dovunque i dipendenti hanno aggirato le tradizionali rigide policy. Le aziende si confrontano con una alternativa: o ignorare queste tendenze con il rischio di non volute brecce di sicurezza o adottare nuovi modi di lavorare applicando un nuovo sistema di gestione.

Grazie alla combinazione di VMware Identity Manager e AirWatch Enterprise Mobility Management, che consente di rafforzare le policy di accesso condizionato basato sul rischio, i dipendenti sono messi nelle condizioni di scegliere il tipo dei propri dispositivi ed essere gestiti all’interno del programma BYOD.

Workspace ONE drasticamente automatizza il tradizionale onboarding, la configurazione di laptop e mobile device e mette a disposizione la gestione del ciclo di vita di applicazioni in tempo reale, che costituisce un ponte tra le applicazioni tradizionali client-server e le nuove cloud mobile.

Fare l’inboarding di nuove app e nuovi dipendenti non potrebbe essere piu’ facile. Una volta autenticati attraverso l’app VMware Workspace ONE, i dipendenti avranno immediatamente accesso al loro app catalog personalizzato dove possono iscriversi virtualmente ad ogni app Mobile, Cloud o Windows. Con l’integrazione con VMware Identity Manager, l’accesso alle applicazioni e’ solo un gesto che abilita immediatamente il mobile Single Sign-On.

Scarica il documento 

Download “vmware-workspace-one-datasheet.pdf” vmware-workspace-one-datasheet.pdf – Downloaded 594 times – 423 KB

I Dispositivi mobili e la gestione del traffico dati

I Dispositivi mobili e la gestione del traffico dati

Gestire i dispositivi mobili e’ ormai prassi comune in tutte le realta’ che hanno visto proliferare nelle aziende, in questi ultimi anni, l’utilizzo di smartphone, tablet, etc.
Fino a qualche tempo fa si riteneva anche che IOS fosse una piattaforma molto sicura mentre Android fosse piu’ vulnerabile.
Tutti gli sforzi dei produttori di MDM in particolare AirWatch erano quindi orientati nel rendere piu’ “blindata” la piattaforma Android in modo da utilizzarla con maggior tranquillita’ in azienda. In questo senso AirWatch ha collaborato strettamente con Samsung e con gli altri produttori hardware su piattaforma Android per fornire garanzie di sicurezza alle aziende che adottavano questa piattaforma.
Un aspetto meno in evidenza e’ invece stato quello relativo alla sicurezza e alla gestione del traffico dati.
In questo campo si evidenziano parecchie brecce di sicurezza anche su piattaforme considerate sicure come Apple.
Alla gestione del traffico dati si dedica Wandera una soluzione integrata in AirWatch che affronta proprio il campo del traffico dati, la cui crescita esponenziale pone nuove sfide ai reparti IT, Security e Governance.
Wandera si occupa anche di contenere i costi del traffico affrontando la questione del roaming ma anche della riduzione tramite compressione dei dati stessi in transito.

Scarica il documento

Download “Wandera_Overview_Datasheet.pdf” Wandera_Overview_Datasheet.pdf – Downloaded 929 times – 3 MB

BMC Discovery o ADDM

BMC Discovery o ADDM

Mantenere aggiornate e sotto controllo le informazioni riguardanti i cespiti e le loro correlazioni e’ una necessita’ spesso non facile da gestire.
La mappatura delle applicazioni dipende da una puntuale verifica degli asset.
Senza una visibilita’ degli asset le decisioni nei data center si basano su tentativi.
Non si possono fissare priorita’, consolidare dati e sapere quali asset supportano quale parte di attivita’ se non in via ipotetica.
La “discovery” delle applicazioni e la mappatura delle relazioni sono correlate e devono basarsi su informazioni univoche e affidabili

BMC Discovery (ex BMC Atrium Discovery e Dependency Mapping o ADDM) crea una dinamica, olistica visualizzazione di tutti gli asset del data center e le relazioni tra loro, dando all’IT una visibilita’ determinante su come gli asset supportano il business. Ogni scansione ricerca le informazioni e le correlazioni di tutto il software, hardware, network, storage, e versioni, fornendo all’ IT il contesto necessario a creare una mappa delle applicazioni da ogni singola informazione raccolta.

In questo modo l’IT e’ in grado in pochi minuti di avere un quadro completo e accurato al 100% della mappa delle applicazioni in meno di 15 minuti. Puo’ cosi’ ottimizzare la capacita’, garantire una maggiore sicurezza, migliorare i servizi, gestire i cambiamenti e la gestione dei “problem”.

Scarica il Documento

Download “475130.pdf” 475130.pdf – Downloaded 1009 times – 396 KB

PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.
Today PKWARE is revolutionizing data security with PK Protect, the world’s most advanced suite of data protection solutions.

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform

PK Protect

Powered by PKWARE e Dataguise technology

The PK Protect product suite comprises everything customers need to secure their most sensitive data and meet their compliance goals by finding sensitive data in structured, unstructured, and semi-structured content supporting detection, remediating sensitive data exposure for risk and compliance obligations, and tracking how and where sensitive data is being accessed.

Make sensitive data discovery and protection easier with a solution that’s intuitive to implement and use, and saves you time, resources, compliance costs, and complication. With the PK Protect Suite, businesses are empowered to work safely with sensitive data to make better business decisions, gain greater customer insights, move to the cloud, and generate new revenue streams.

Meet requirements under GDPR, CCPA, PCI-DSS, HIPAA, ITAR and other regulatory and industry mandates.

Protect data with a mix of masking and encryption based on who needs access and how the data will be used/viewed.

The suite encompasses the following solutions:

  • PK Discovery

Without requiring a single line of code, PK Discovery delivers fine-grained, aggregated optics into what sensitive data you have and where it resides. Find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. Integration with other PK Protect Suite capabilities can then trigger automatic encryption, masking, redaction, or other remediation for sensitive information.

  • PK Classification

Keeping a fast, dynamic and continuous record of the types of sensitive data an organization has. Data classification solutions are an essential component of helping organizations categorize data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.

  • PK Encryption

Dynamically encrypting data in motion or at rest on the broadest platform in the industry

Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. PK Encryption empowers both persistent encryption that applies protection directly to the data, or transparent data encryption for protecting stored data on enterprise servers.

  • PK Masking

Maintain control of sensitive data by masking it consistently across data stores. Static masking options can keep the data masked at rest, while dynamic masking options only mask data when it is in use. Automatically mask sensitive data in a DBMS to fully leverage the entire data set for more accurate and meaningful insight and measurement without compromising data security

  • PK Privacy

Control your company’s data privacy at the data, enterprise, and individual level with powerful PK Privacy engineering solutions, powered by Dataguise technology.

Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

This right-to-know discovery solution indexes identities and the data about those identities. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information as requested. Continuous monitoring for privacy data makes it easy to respond to a DSAR with the right policy.

Enable pseudonymization, anonymization, and de-identification of private personal data.

WinZip

WinZip

Developed by WinZip Computing now acquired by Corel Corporation

Winzip Standard e Winzip Pro

Zip, protect, manage and share your files with WinZip.

  • Zip and unzip instantly.
  • Manage all your files in one place.
  • Share directly to cloud, social media and IM.
  • Convert to PDF, add watermarks and resize photos.
  • Connect and share on the go with ZipShare

 

 

StarNet

StarNet

StarNet Communications Corporation was founded in 1989 and incorporated in 1990 by engineers working part-time out of their home. The  corporate mission was to create and market powerful, yet affordable PC-X server products for corporate, education and government markets.

The first X Server product, MicroX, was launched in 1991. It enabled users of 286 and 386-based Intel systems to access the X Window System from their personal computers. Quite possibly, StarNet was the first company to base its entire business model on the Internet, because in 1991, the Internet was mostly used by universities and government agencies. As a result, and aided by its low cost, simplicity and focus on the X server functionality, X-Win32 quickly became popular in these sectors.

StarNet has grown its market share by bringing a steady stream of innovations to the market, starting in 2000 with integrating SSH and most recently with FastX which allows users to access their remote Linux and Unix desktop through standard PC browsers. FastX also offers the ability to Suspend/Resume sessions.

 

Open/Close alle the descriptions

X-WIN32

The Best PC X Server for X Windows Display on Your LAN

After nearly 25 years of development, X-Win32 is the most versatile PC X Server for displaying remote Unix and Linux desktops and individual X applications. X-Win32 is widely used in demanding engineering design sectors such as defense/aerospace, molecular biology, and IC design with applications like Cadence Virtuoso.

Best Security

X-Win32 comes with an integrated SSH that encrypts all data between the client and the server, making remote x terminal connections from home and elsewhere very secure.

Fastest 3D/Rendering

The hardware acceleration on the local PC and the implementation of 65 OpenGL extensions allow X-Win32 to offer the fastest OpenGL support in the industry. 3D applications like Catia and Eclipse work like they were running locally.

Text/Graphics
Copy & Paste

X-Win32 is the only PC X Server that offers integrated copying of both text and graphics from X applications into Windows.

Multiple X Desktop

With X-Win32, open remote Unix and Linux desktops from several different hosts at the same time. You can Alt-Tab between Unix, Linux and Windows desktops, even copy data from one host to another.

Dynamic Window Scaling

X-Win32 is the first PC X server having activated the RandRextension, you can now scale the remote desktop simply by grabbing the corner of the window and dragging it to the desired size. You can also scale the window to be larger than your actual monitor.

 

FastX

The First Remote Linux Solution in the Cloud

FastX is the first and only remote Linux solution that allows users to connect to their sessions from any device with a web browser, even from your smart phone.

Linux in a browser

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Fastest Remote Linux Display

FastX displays your remote Linux or Unix desktops or individual X applications faster than any other solution over both LAN and WAN connections. You can work on demanding graphic applications (EDA tools) when connecting over VPN to servers even thousands of miles away.

An Affordable Solution

FastX costs a fraction of what commercial competitors charge. the combination of a lower cost, better performance and security, and advanced end-user and admin features make FastX the best X Windows emulator on the market.
Admin tools

FastX offers an array of administrator tools to keep your team running securely and efficiently. Server monitoring, scripted installation and theme support, to name a few.

Load Balancing

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Ericom

Ericom

Ericom Software is a leading global provider of Access, Virtualization and RDP Acceleration solutions. Since 1993, Ericom enables organizations across all industries to provide secure, centrally managed access to applications, desktops and data running on Microsoft RDS / Terminal Services, VDI, Cloud platforms, and other systems, from a broad range of end user computers and mobile devices.

Open/Close all the descriptions

Terminal emulation – client based

PowerTerm® Lite

Powerful and Secure Terminal Emulation for Unix

PowerTerm Lite, Ericom Software’s terminal emulation products for Unix, maximize the capabilities of legacy systems with a minimal amount of installation time and software space. Because PowerTerm Lite has a small footprint, it is easily installable on any PC, making it a simple and fast solution for running legacy applications. PowerTerm Lite’s rich feature set and fast key response has made it the product of choice for thousands of corporations throughout the world.

With a Terminal Server License, PowerTerm Lite can be used by multiple users simultaneously.

PowerTerm® Plus

Powerful and Secure Terminal Emulation for Unix

PowerTerm Plus, Ericom Software’s terminal emulation product for Unix, maximizes the capabilities of legacy systems with a minimal amount of installation time and software space. Because PowerTerm Plus has a small footprint, it is easily installable on any PC, making it a simple and fast solution for running legacy applications. PowerTerm Plus’s rich feature set and fast key response has made it the product of choice for thousands of corporations throughout the world.
PowerTerm Plus includes SSH, FTP Client and SFTP client

With a Terminal Server License, PowerTerm Plus can be used by multiple users simultaneously.

 

PowerTerm Interconnect

Client Based Terminal Emulator Software for Windows, Mac, Linux
The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution.

PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as: IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP.

Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes including: IBM 3270, IBM 3151, IBM 5250, AT386, Wyse 370, Data General, Tandem 6530, HZ 1500, IBM 525, ANSI, Linux Console, Wyse 50+/50/60, HP 700/92, Siemens, VT 52 – 525, SCO, AIXterm, Televideo, HP 700/96, ADDS VP A2.

PowerTerm InterConnect is available in the following editions:
PowerTerm Interconnect Windows Edition, PowerTerm Interconnect Mac OS X Edition e PowerTerm Interconnect  Linux Edition.

PowerTerm® Pro/Enterprise

Secure 3270 and 5250 Terminal Emulators for Windows – with VBA
The PowerTerm Pro Series is Ericom Software’s premier 3270 and 5250 terminal emulation solution for Windows that simplifies and extends legacy access functionality. Supporting a diverse range of hosts and emulation types, PowerTerm Pro enables corporations to standardize on a single host access solution. Featuring a customizable GUI, SSL, SSH and secure file transfer (SFTP), PowerTerm Pro and PowerTerm Pro/Enterprise offers a number of options, so corporations can choose the PowerTerm Pro product that meets their host, security, server and productivity needs.
PowerTerm Pro Enterprise offers the full functionality of PowerTerm Pro while incorporating Microsoft Visual Basic® for Applications (VBA) and the leading security protocols such as SSL and SSH.

 

Terminal emulation – Web-based

PowerTerm WebConnect HostView

Web–to–Host Access: Secure & Centrally Managed

In today’s economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm WebConnect HostView browser-based (web to host) emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Supporting over 35 terminal emulation types (including IBM 3270 IBM 5250, VT, HP and Tandem), Ericom’s web-to-host terminal emulation software connects to applications running on a wide range of legacy hosts, including IBM Mainframe (zSeries), IBM Midrange (iSeries), OpenVMS, HP3000, Unix, Linux, Tandem and others.

 

HTML5 Browser based

Ericom AccessNow™ HTML5 RDP Client

HTML5 In Browser RDP Access – Easy to use and simple setup!
AccessNow is an HTML5 remote desktop gateway that works from any device with an HTML5 compatible browser, including from Chromebooks and locked down devices
Ericom AccessNow is the market’s first high performance HTML5 RDP Client, providing browser access to Windows applications and desktops (virtual & physical), running on Windows Terminal Services / RDS / VDI platforms, including Microsoft Hyper-V and other hypervisors. Now supports Windows 10 and Windows Server 2012 R2
Zero Client Software! No need to install: Flash, Silverlight, ActiveX or any other underlying technology on the end-user device
Access and control your desktop from anywhere! Use any HTML5 enabled Device, Smartphone / Tablet (e.g., iPad, iPhone, Android device), locked-down work station, or computer running Windows, Mac OS X, Linux or Chrome OS.

Ericom AccessNow ™ for VMware View ™

Pure HTML5 Access to View Virtual Desktops — from any HTML5–enabled –browser or client device
Enable users to quickly and easily connect to VMware Horizon View (VMware VDI) desktops directly from any HTML5 compatible browser on any platform. This includes from Windows, Mac, Linux, iPad / iPhone, Google Chromebook, Android, RIM BlackBerry / Playbook, Amazon Kindle Fire HD — even locked-down Workstations — without having to download, install or configure any software on the end-point device. Now supports Windows 8 and Windows Server 2008.

 

Centrally managed Access with terminal emulation

PowerTerm WebConnect Enterprise

PowerTerm WebConnect Enterprise (Windows Edition) provides secure, centrally managed enterprise-wide access to applications and desktops, running on Windows Terminal Servers, Virtual Desktops, Blade PCs and legacy host systems, from Windows, Mac and Linux PCs, thin clients, tablets, smartphones, as well as any end-point device supporting an HTML5 browsere

 

RDP Acceleration

Blaze

Frustrated by Slow RDP sessions or PDF scrolling? Get up to 10x faster graphics, animations & response times!

Ericom Blaze RDP compression and acceleration software delivers a great local PC-like experience across WAN / LAN, while reducing bandwidth consumption and optimizing RDP network traffic. Use it to speed up slow remote desktop connections, PDF displays, and audio / video performance on terminal services (RDS).

 

Centrally managed Access

PowerTerm WebConnect Deskview

As an enhanced connection broker, PowerTerm WebConnect DeskView enables organizations to deploy and centrally manage Windows virtual desktops hosted on the latest virtualization platforms, including hypervisors from VMware, Microsoft, Oracle, Xen, etc., as well as on PCoIP Blade PCs and PCoIP Workstations.

Ericom Connect

Hyper–Scalability and Management Simplicity
Ericom Connect is a powerful remote application and desktop access solution. Built on innovative technology and two decades of Ericom’s proven expertise in the access market, Ericom Connect offers organizations unparalleled scalability, superior user experience and exceptional ease of use. With great cost performance, Connect integrates into existing IT environments, reducing the need for costly infrastructure upgrades.
Take advantage of Connect’s ease of implementation, powerful reporting and scalability to overcome day-to-day business challenges and accelerate your growth. Supporting the widest range of user devices, Connect ensures employees can easily access the resources and services they need to be productive, wherever they are and whichever device they’re working on
Connect leverages both Amazon and Microsoft cloud SQL as a service, enabling smoother and faster deployments of cloud-based services such as DaaS

Connect is available in the following edition: Ericom Connect Enterprise and Ericom Connect Professional.

Secure Browsing

Ericom Shield

Ericom Shield – the safest way to let users browse the web.

Web browsing in as integral part of standard business operations. Yet, risk user browsing generates the majority of security breaches.
Ericom Shield is Ericom’s next generation browser isolation solution. Leveraging Ericom’s proven virtualization and browsing technologies, Ericom Shield creates an isolated “safezone” that protects corporate networks and end-user devices from web-borne attacks. All active content is routed to a virtual remote browser and is safely isolated from the local network reducing the attack surface to prevent malware breaches.

Each browsing session powers up a dedicated virtual browser that executes web browsing in an isolated and disposable container. Web content is viewed as a visual representation streamed to the end user without executing any code on the endpoint. While browsing, file downloads are sanitized in the background without impacting user experience or file functionality. At the end of each session, the remote container is discharged.

Any operating system, browser and device are supported.