Mainframes, iSeries, and UNIX systems remain critical in finance, healthcare, and government. Securing remote access isn’t optional—it’s required by strict regulations. The challenge: many legacy hosts don’t support modern security like SSL or TLS, forcing IT teams to find solutions that won't disrupt operations or create downtime.
Rocket TE Security Server bridges this gap. It’s a Windows-based proxy that enables robust SSL/TLS encryption for Rocket TE clients, acting as a secure intermediary between clients and host systems. This allows encrypted tunnels for remote sessions, giving admins control over which connections are encrypted, based on compliance needs—all without touching the original legacy code.
Dual-mode flexibility for your network
Rocket TE Security Server adapts to different environments through two modes:
- SSL to clear-text proxy: Rocket TE clients connect securely via SSL, with traffic decrypted at the server before reaching hosts that can't process SSL/TLS. This protects data en route, even if the legacy host is unencrypted.
- Clear-text to SSL proxy: Non-SSL legacy clients connect in clear text; the security server then establishes a secure tunnel to another compliant server or host. This easily modernizes old systems and supports secure cross-domain transfers.
Simplifying compliance and audit readiness
With growing compliance burdens and audit expectations, you need to demonstrate secure, controlled access to critical data. Rocket TE Security Server centralizes encryption and access policy enforcement, supporting comprehensive audit trails and higher audit scores. It’s a fast win for security teams—roll out encryption and access controls enterprise-wide without upending existing infrastructure.
Seamless IAM integration
Integrating legacy applications with IAM platforms can be complex. Rocket TE Security Server makes it easier, acting as a bridge to enforce modern identity and multi-factor authentication before access is granted to host systems. This reduces breaches and unauthorized access, and it supports your existing IAM projects without disrupting users.
Why choose Rocket TE Security Server?
Centralizing SSL with Rocket TE Security Server offers clear advantages:
- Centralized management: Manage certificates and keys in one place, reducing admin effort and risks.
- Consistent security controls: Enforce policy compliance across all clients and systems.
- Scalable and compatible: Supports growing transaction volumes and both Rocket TE and other SSL-enabled clients.
Designed for real users
Adoption rates stay high because Rocket TE Security Server is simple to use. Users log in as usual; encryption happens behind the scenes. This cuts down support tickets and keeps productivity intact.
Get started quickly
You can evaluate Rocket TE Security Server immediately—Windows 10 evaluation mode supports three sessions without a license key. Instant testing makes it easy to prove value and iron out IAM integrations before full rollout.
Who should use Rocket TE Security Server?
This solution is for IT leaders responsible for compliance, secure access, and integration across legacy platforms—especially those managing audits or modernizing critical infrastructure. If you manage Windows servers and networking, you’ll get up and running quickly.
What’s next?
This series will cover architecture, advanced configuration, and certificate management—steps to further fortify your host access. Stay tuned for a hands-on look at what’s possible with Rocket TE Security Server.
