Tectia

Tectia® Server 6.2 for IBM z/OS

Product Description

Tectia Corporation

This software is protected by international copyright laws. All rights reserved. Tectia® and ssh® are registered trademarks of Tectia Corporation in the United States and in certain other jurisdictions. The Tectia and SSH logos are trademarks of Tectia Corporation and may be registered in certain jurisdictions. All other names and marks are property of their respective owners.

No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of Tectia Corporation.

THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING.

For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the User Manual.

20 April 2012


Table of Contents

1. Introduction
Tectia Solutions
Tectia Solution Components
Tectia Client
Tectia Server
Multi-Platform Support
Tectia Support Services
2. Key Applications
Secure File Transfer - FTP Replacement
Secure File Transfer Protocol (SFTP)
FTP-SFTP Conversion
Transparent FTP Tunneling
Secure System Administration
Secure Application Connectivity
3. Features and Benefits
Tectia Client/Server Solution Features
High Performance
Ease of Use
Features Specific to Tectia Server for IBM z/OS
4. Authentication
Server Authentication
User Authentication
Strong Authentication
5. Use Cases
Secure System Administration
Replacing Plaintext FTP with FTP-SFTP Conversion
Securing Plaintext FTP with Transparent FTP Tunneling
Secure TN3270 Application Connectivity to IBM Mainframes
Securing Database Replication
6. Product Specification
Supported Operating Systems
Hardware and Space Requirements
Tectia Features per Product
Supported Authentication Methods
Supported User Authentication Methods
Supported Cryptographic Algorithms, Protocols, and Standards
Hardware Acceleration of Cryptographic Operations