From a central location, deploy customized, secure browser-based sessions, with supporting keyboards, quick keys, and macros, and provide HTML5 access to 3270, 5250, VT, Unisys® , and airline host applications.
Simple, secure, and no Java® in sight.
Secure centralized host access
From a central location, deploy customized, secure browser-based sessions, with supporting keyboards, quick keys, and macros, and provide HTML5 access to 3270, 5250, VT, Unisys® , and airline host applications.
Secure, browser-based deployment.
No workstation management, or Java environments.
User Authentication
By integrating your Identity and Access Management (IAM) system, Host Access for the Cloud authenticates users with your corporate identity credentials. Seamlessly update security settings and session configurations – based on your user directory
Seamlessly update security settings and session configurations.
User access authentication and authorization.
Strong host access security
Get a one-time pass ticket to authenticate to RACF, ACF2, or Top secret and protect communication with HTTPS, TLS, SSH, and FIPS 1.2 validation.
Strengthen weak, eight-character passwords with strong, complex ones.
Leverage your corporate user directory for onboarding.
Since your IAM is integrated, administrators can leverage directory schema to ensure only authorized host application access, based on the user’s role.
Extend Host Access for the Cloud to users who don’t need a desktop client, ensuring secure mainframe access. It also acts as a fallback solution during natural disasters, pandemics, and system outages.