authentication logon protocol ensures only authorized
users have access.
with role-based access controls.
protocol helps prevent attacks not only by outsiders,
but also by negligent or malicious insiders.
of all communications between the IDG
clients ensures security of the data stream.
activity logs provide auditability.
Unauthorized personnel cannot access log
GUI-based administration program.
remote access means disaster recovery plans can be
supported and maintained from any location.
patent-pending Instant Replay feature presents a
scrollable history window showing a
Replay captures refreshed screens and saves memory.
Instant Replay is also useful in training.
Telnet clients included at no additional charge.
Connections can also be made through SSH or
easy-to-use REXX programming language that allows
quick automation of operating system commands.
security administrators with an “over-the
shoulder” view of operators with root access
without the operators knowledge, allowing for
real-time, proactive monitoring, even of multiple
9074 is an “out-of-the-box” solution that
installs quickly and does not require intensive
training of security administrators.
9074 can connect to multiple Unix servers. An
alternate IDG 9074 can provide redundancy. The
combination of a primary and alternate is far more
affordable than other solutions priced on the basis
of an entire server farm.