Security is paramount to most organizations, including those whose business relies on mainframe 3270 applications. But accessing the applications through thick-client TN3270 emulators exposes them to web attacks.
Here are seven vulnerabilities of thick-client TN3270 emulators that can be eliminated by migrating to a thin-client browser-based 3270 terminal emulator like Virtel Web Access:
- Exposed Terminal Emulation Code
- Reliance on Internet Explorer
- Exposed Unaudited Macros
- Threatened IAM Integration
- No Access Audit Trail
- VPN-Dependent Encryption
- Exposed 3270 Fields
For a full explanation as to how these vulnerabilities can negatively effect your organization, please download this short PDF. Also included are ways that Virtel Web Access and other web-based 3270 TE solutions guard against these security risks and protect your data and network.
Seven TN3270 Emulator Weaknesses that Expose your Data
We will discuss the major security vulnerabilities associated with traditional, thick-client TN3270 emulators and how a solution like VWA can help.
Join us for this 22-minute webinar that’s available for on-demand viewing beginning Wednesday, September 15, 2021.