Sensitive File Transfers
Using the strong authentication and encryption methods built into Reflection for Secure IT, you can effectively safeguard private files traveling over untrusted TCP/IP networks. You can also use the message-checking capabilities in Reflection for Secure IT to ensure that data has not been tampered with.
Secure Remote Administration of Critical Servers
Reflection for Secure IT enables remote administration of critical servers with the robust SSH protocol suite, which includes SSH, SFTP, and SCP. Reflecton for Secure IT’s SSH-based clients and servers use strong authentication and encryption methods to shield data from unintended disclosure.
Existing Authentication and Authorization Methods
Reflection for Secure IT works with an array of authentication and authorization methods, so you can easily pair them with your existing security framework. To verify user or system identity—and block access to private files or systems through nefarious means—Reflection for Secure IT supports Kerberos, PKI, passwords, public keys, smart cards, and RSA SecureID.
Encrypted Tunnels for Nonsecure Applications
An encrypted tunnel makes it possible for data to travel safely from point A to point B without being hijacked. With Reflection for Secure IT, IT organizations can build encrypted tunnels when and where they need them. In this way, they can secure their nonsecure TCP/IP-based applications, without ever touching the applications themselves.
System Compatibility with Security Standards
Reflection for Secure IT supports security standards that are used across IBM, UNIX, Linux, and Windows platforms. These standards include SSL/TLS, SSH, and Kerberos. There’s no substitute for the flexibility and ease of use provided by these standards.
Learn more about secure file transfer
Together, the Reflection for Secure IT SSH client and server form a secure "tunnel" through which all communications travel.