SlideShare a Scribd company logo
The Perils of Aging Terminal Emulators
Why older emulators present a high security risk
Data on host systems is often the most sensitive on the
network. Terminal emulators on the desktop provide
access to these systems, but many organizations are
still using older products, deployed using best practices
from many years ago.
Older terminal emulators often don’t allow organizations
to comply with current security standards, and they
don’t give IT administrators the customization control
they need to properly secure their network. Yet many
companies are unaware of the inherent risks of staying
with older products.
Does your terminal emulation client conform to modern
security standards? Is your key business and customer
information secure? Because security breaches and
insider fraud are on the rise, organizations must protect
their sensitive data more tightly and comply with new
government regulations and standards such as PCI-DSS,
USGCB, FDCC, and FIPS 140, which are designed to
strengthen desktop deployment and data security.
Staying on an older emulator can put your networks
and your sensitive data in a vulnerable position. But
modernizing your terminal emulation deployment can
keep you compliant and protect against threats.
Here are five reasons why you should consider updating
your terminal emulation product:
1) Your security protocols might not
be truly secure.
If you’re using an older terminal emulator, the
product’s SSL/TLS and SSH encryption and
authentication technology probably isn’t secure.
Although most emulators include SSL/TLS
and SSH technologies, which provide secure
authentication to host systems and encrypt
transmission of sensitive corporate data,
hackers expose new vulnerabilities in these
protocols nearly every month.
With terminal emulation products, fixes to these
vulnerabilities aren’t automatically pushed
to customers; instead, they’re addressed in
product updates. If you’re not using the latest
version of your product, you’re likely exposed
to a number of vulnerabilities in your SSL/TLS
and SSH protocols.
In older emulation products, these protocols aren’t
lacking just important security fixes. They’re also
missing new capabilities that have been added over
the years, particularly on the authentication side, to
better secure your connections to host systems. These
additional safeguards aren’t available until you upgrade
your terminal emulator.
To provide truly secure host connectivity, your emulator
should contain military-strength SSH and SSL and be
certified with the latest standards.
2) What you don’t know CAN hurt you:
end-user macros.
Do you know where your macros are in the enterprise?
What do they do? If you don’t know the answers to these
questions, you’re exposed to a large, unknown risk.
All terminal emulation clients allow end users to record
macros to automate their daily tasks. Most terminal
emulators allow customers to build sophisticated macros
using tools like Visual Basic for Applications (VBA).
These advanced macros might allow users to record
everything typed into a host system, including sign-on
credentials. Or they might allow repetitive crawling
through screens to extract or update data on the host.
Not only that, deployment practices from years ago
allow users to easily share risky macros like these via
e-mail and sneaker-net.
The Perils of Aging Terminal Emulators
Why older emulators present a high security risk
WHITE PAPER
Risky macros allow sensitive business data, including user credentials, to be recorded,
copied, and shared.
WHITE PAPER
Do you have any of these macros in the enterprise? If
so, who owns them? Can they be easily shared?
To effectively manage macros and other automated
tasks, your emulation client should allow administrators
to deploy terminal emulation with granular controls, so
that only trusted macros can be executed.
3) Tracing features allow the capture of sensitive
corporate data.
Most older terminal emulation deployments include a
tracing feature that allows end users to record to an
unencrypted file all data visible during a host session.
Once in a file, this sensitive information could easily
leave the PC—and your enterprise—via e-mail or
portable media.
All terminal emulators provide a tracing facility; however,
your product should allow you to disable or prevent
access by end-users. The easiest way to do so is
through the use of the User Account Control Elevation
feature on Windows Vista or Windows 7. This feature
gives administrators granular control over the facilities
an end-user can access.
4) Older terminal emulation clients don’t
mask data.
Sensitive data is just a CTRL-C away from leaving most
terminal emulators. Most older emulators allow users to
e-mail a host screen using the installed e-mail system.
This lack of data masking makes it easy for end-users
to share sensitive information with other applications.
A modern terminal emulator should provide advanced
features like privacy filters, which allow administrators
to prevent certain patterns of data from leaving the
application. For example, sensitive data such as credit
card numbers, social security numbers, and other
personal information can be prevented from reach-
ing the clipboard, Word documents, and Outlook
e-mails—and also from being printed. Through pattern
matching technology, the information is redacted as it
leaves the host application.
5) It starts with a Secure Development Lifecycle.
Your terminal emulation vendor should utilize a well-
documented Secure Development Lifecycle that will
help protect you from security threats. Your vendor
should make security the number-one priority for each
new release or update, and should have a dedicated
security team that oversees the development and
certification of its security technologies. Security fea-
tures should not be simple check-box items; instead,
intensive security testing and threat modeling needs
to be performed in order to help maintain the integrity
of your business applications.
Upgrade and eliminate your risks.
When you’re selecting a terminal emulation
vendor, make sure to start with one that has
the resources and experience to implement
best practices and to keep up with newly
uncovered threats and vulnerabilities. You
should look for a vendor that can help you
leverage the latest security updates without
disrupting your production environment.
For nearly 30 years, Attachmate has developed
highly secure terminal emulation products,
and helped customers seamlessly upgrade
from less secure products. Through this
deep experience, which includes dedication
to a Secure Development Lifecycle, Attachmate
allows you to address crucial security
risks—and gain control of your terminal
emulation desktops.
© 2011 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, and Reflection are registered trademarks of Attachmate Corporation in the USA. All other trademarks, trade
names, or company names referenced herein are used for identification only and are the property of their respective owners. 11-0006web.0211
Reflection®
2011 keeps sensitive data secure by preventing it from leaving the host application.

More Related Content

What's hot

A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
Symantec
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
Symantec
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Qualys
 
SureLog SIEM Jobs
SureLog SIEM JobsSureLog SIEM Jobs
SureLog SIEM Jobs
Ertugrul Akbas
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
AccelOps
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
OSB130 Patch Management Best Practices
OSB130 Patch Management Best PracticesOSB130 Patch Management Best Practices
OSB130 Patch Management Best Practices
Ivanti
 
WAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rulesWAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rulesDimitris Gkizanis
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating Systems
Cisco Canada
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Qualys
 

What's hot (20)

A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
SureLog SIEM Jobs
SureLog SIEM JobsSureLog SIEM Jobs
SureLog SIEM Jobs
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
OSB130 Patch Management Best Practices
OSB130 Patch Management Best PracticesOSB130 Patch Management Best Practices
OSB130 Patch Management Best Practices
 
WAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rulesWAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rules
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating Systems
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 

Similar to 110006_perils_of_aging_emul_wp

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_securityJessica Hirst
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
Flexera
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Symantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Corporation
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Corporation
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy EnterpriseDMIMarketing
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsCodenomicon
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Symantec
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
Gregory McNulty
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
Gregory McNulty
 

Similar to 110006_perils_of_aging_emul_wp (20)

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_security
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy Enterprise
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
 

110006_perils_of_aging_emul_wp

  • 1. The Perils of Aging Terminal Emulators Why older emulators present a high security risk Data on host systems is often the most sensitive on the network. Terminal emulators on the desktop provide access to these systems, but many organizations are still using older products, deployed using best practices from many years ago. Older terminal emulators often don’t allow organizations to comply with current security standards, and they don’t give IT administrators the customization control they need to properly secure their network. Yet many companies are unaware of the inherent risks of staying with older products. Does your terminal emulation client conform to modern security standards? Is your key business and customer information secure? Because security breaches and insider fraud are on the rise, organizations must protect their sensitive data more tightly and comply with new government regulations and standards such as PCI-DSS, USGCB, FDCC, and FIPS 140, which are designed to strengthen desktop deployment and data security. Staying on an older emulator can put your networks and your sensitive data in a vulnerable position. But modernizing your terminal emulation deployment can keep you compliant and protect against threats. Here are five reasons why you should consider updating your terminal emulation product: 1) Your security protocols might not be truly secure. If you’re using an older terminal emulator, the product’s SSL/TLS and SSH encryption and authentication technology probably isn’t secure. Although most emulators include SSL/TLS and SSH technologies, which provide secure authentication to host systems and encrypt transmission of sensitive corporate data, hackers expose new vulnerabilities in these protocols nearly every month. With terminal emulation products, fixes to these vulnerabilities aren’t automatically pushed to customers; instead, they’re addressed in product updates. If you’re not using the latest version of your product, you’re likely exposed to a number of vulnerabilities in your SSL/TLS and SSH protocols. In older emulation products, these protocols aren’t lacking just important security fixes. They’re also missing new capabilities that have been added over the years, particularly on the authentication side, to better secure your connections to host systems. These additional safeguards aren’t available until you upgrade your terminal emulator. To provide truly secure host connectivity, your emulator should contain military-strength SSH and SSL and be certified with the latest standards. 2) What you don’t know CAN hurt you: end-user macros. Do you know where your macros are in the enterprise? What do they do? If you don’t know the answers to these questions, you’re exposed to a large, unknown risk. All terminal emulation clients allow end users to record macros to automate their daily tasks. Most terminal emulators allow customers to build sophisticated macros using tools like Visual Basic for Applications (VBA). These advanced macros might allow users to record everything typed into a host system, including sign-on credentials. Or they might allow repetitive crawling through screens to extract or update data on the host. Not only that, deployment practices from years ago allow users to easily share risky macros like these via e-mail and sneaker-net. The Perils of Aging Terminal Emulators Why older emulators present a high security risk WHITE PAPER Risky macros allow sensitive business data, including user credentials, to be recorded, copied, and shared.
  • 2. WHITE PAPER Do you have any of these macros in the enterprise? If so, who owns them? Can they be easily shared? To effectively manage macros and other automated tasks, your emulation client should allow administrators to deploy terminal emulation with granular controls, so that only trusted macros can be executed. 3) Tracing features allow the capture of sensitive corporate data. Most older terminal emulation deployments include a tracing feature that allows end users to record to an unencrypted file all data visible during a host session. Once in a file, this sensitive information could easily leave the PC—and your enterprise—via e-mail or portable media. All terminal emulators provide a tracing facility; however, your product should allow you to disable or prevent access by end-users. The easiest way to do so is through the use of the User Account Control Elevation feature on Windows Vista or Windows 7. This feature gives administrators granular control over the facilities an end-user can access. 4) Older terminal emulation clients don’t mask data. Sensitive data is just a CTRL-C away from leaving most terminal emulators. Most older emulators allow users to e-mail a host screen using the installed e-mail system. This lack of data masking makes it easy for end-users to share sensitive information with other applications. A modern terminal emulator should provide advanced features like privacy filters, which allow administrators to prevent certain patterns of data from leaving the application. For example, sensitive data such as credit card numbers, social security numbers, and other personal information can be prevented from reach- ing the clipboard, Word documents, and Outlook e-mails—and also from being printed. Through pattern matching technology, the information is redacted as it leaves the host application. 5) It starts with a Secure Development Lifecycle. Your terminal emulation vendor should utilize a well- documented Secure Development Lifecycle that will help protect you from security threats. Your vendor should make security the number-one priority for each new release or update, and should have a dedicated security team that oversees the development and certification of its security technologies. Security fea- tures should not be simple check-box items; instead, intensive security testing and threat modeling needs to be performed in order to help maintain the integrity of your business applications. Upgrade and eliminate your risks. When you’re selecting a terminal emulation vendor, make sure to start with one that has the resources and experience to implement best practices and to keep up with newly uncovered threats and vulnerabilities. You should look for a vendor that can help you leverage the latest security updates without disrupting your production environment. For nearly 30 years, Attachmate has developed highly secure terminal emulation products, and helped customers seamlessly upgrade from less secure products. Through this deep experience, which includes dedication to a Secure Development Lifecycle, Attachmate allows you to address crucial security risks—and gain control of your terminal emulation desktops. © 2011 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, and Reflection are registered trademarks of Attachmate Corporation in the USA. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 11-0006web.0211 Reflection® 2011 keeps sensitive data secure by preventing it from leaving the host application.