J42 for Secure Access - Passthru Server

Purpose
Web technology allows you to efficiently and effectively provide Internet based solutions for your B2B needs but you need to feel that the information passing over these links is secure. J42 for Secure Access provides a simple and hence effective solution to secure access across the Internet.
J42 for Secure Access has been designed to allow both connection level security as well as transaction level security in any generic client-to-host scenario regardless of the technology in use. And by using SSL technology, J42 for Secure Access provides a standard interoperable secure solution.
At the core of J42 for Secure Access is a flexible SSL based server that can talk to any client using the standard SSL protocol. Typical examples of clients are web browsers using the HTTPS protocol and J42 for Application Access web-to-hosts GUI clients. Just install J42 for Secure Access behind the firewall and it supports client communication with any host. The host connection can use any protocol including Web server, e-mail server and legacy host systems including IBM mainframe, mid-range machines and HP NonStop servers. The result is a secured client-to-J42 for Secure Access SSL encrypted session which transparently communicates with the existing host system. In addition, the core product provides an optional Java-based client API for adding SSL support to non-SSL clients. A simple and yet effective way to secure your B2B applications.
Often the B2B application requires more than just a secure connection which is why J42 for Secure Access supports transaction level security. With J42 for Secure Access you can identify actual transactions, require the transactions to be digitally signed by the client and verify the client's digital signature before passing the controlled transaction to the host. Extensive logging facilities provide support for transaction non-repudiation. This type of transaction security requires a flexible approach which is why J42 for Secure Access is based on a extensive set of APIs and built into the architecture of the product is the ability to monitor the client-host communication, allowing for the full control of information flowing between the client and host. Combined with J42 for Application Access, J42 for Secure Access provides a unique instant secured GUI solution for web-to-host access.
J42 for Secure Access provides remote HTTPS based administration with multiple server support allowing a flexible scaleable performant solution with easy-to-use control. Plus a multilevel tracing facility and each server process is fully parameterized.
Based purely on Java technology, J42 for Secure Access can be run on any platform which supports Java including HP NonStop, IBM AIX, Linux and Windows NT/2000.
J42 for Secure Access also is provided with full documentation for the product and APIs.
Features
- J42 for Secure Access is 100% Java
- Runs on any platform: runs as a Java application on any Java compliant platform.
- Full Security Package: with support for
- Confidentiality: using standard SSL technology
- Authentication: through client and server authentication
- Non-Repudiation: via support for logging of communication and digitally signed transactions
- Flexible Packaging: basic module gives you server authentication and confidentiality using SSL, more advanced options give you user authentication and transaction non-repudiation.
- Strong SSL Encryption: full strength encryption to ensure confidentiality
- Authentication through Smart Cards or other devices: authenticate the user through Smart Cards or biometric devices
- Digitally Signed Transactions: automatically detect the host screens containing security critical transactions and use digital signing to create non-repudiateable records of the transaction
- Interfaces to HSMs: APIs for interfacing to Hardware Security Modules using the industry standard PCKS#11 specification. An HSM gives you security for your private keys and hardware acceleration for the encryption routines.
- Interfaces to authentication servers: APIs for interfacing to your chosen authentication server which provides up-to-the-minute authentication of certificates used for digital signatures.
- Extensive tracing facilities: to identify problem connections or clients
- Logging facilities: Logging API to allow you to store signed transactions in files, in a database and/or on a WORM drive.
- On-line monitoring and control: the system administrator has web browser access to details of all sessions plus the ability to cancel them
- Startup and shutdown control: start as a service with force and quiesce shutdown options
- Interoperability: full support for interoperability with other Web solutions
Technical information
J42 for Secure Access is developed using Java technology and requires a minimum of Java v1.4.2. J42 for Secure Access uses industry standard encryption technology and techniques including SSL, Diffie-Hellman, MD5, SHA, RSA, DES and triple-DES.
Request a free evaluation copy of J42 for Secure Access
Back to top