Secure Agent Software provides Disaster Recovery & Data Recovery SolutionsData Center Automation, Business Continuity, Disaster Recovery, & Off-Site Data BackupKeep the Data in Your VTL Safe & Secure with a Disaster Contingency Plan
                                        Featured Product:   Secure Data Solution®   "Securing Your Tape Backups"   >   Learn More                            Site Map
Secure Agent Software Home PageAbout UsSolutionsProductsClients & PartnersNewsSupportContact Us

 

      IDG 9074®    

Configurations
 

Central User Administration and User Defined Access
Each IDG 9074 can replace up to 128 IBM 3174 controllers, and provides 256 non-SNA or 1,000 SNA sessions
per ESCON or FICON adapter, or a combination of both. Also the IDG 9074 implements data encryption, data compression and a request-challenge-response user authentication. Both ESCON and FICON channel attachments are supported and can be connected directly from the host CPU to the IDG 9074 or through an ESCON or FICON director.
The Secure Domain Server provides logon security, controls user privileges, and manages access rights from a central point. Users can be limited to particular sessions. All access, authority, privileges, and security functions can be securely administered from a central point of control.


SecureAgent® Technology
SecureAgent technology enables technical personnel Remote Access to manage any system in the enterprise from any local or remote location with complete security.
This software layer protects remote and networked communications with a combination of patented and patent-pending processes including encryption, compression, and user authentication.

Encryption
SecureAgent's encryption is transparent to the user, easy-to-use and requires no special training.
It is a simple matter of logging on and working as normal.

  • Provides the highest allowable encryption keys

  • Provides protection against attacks


Compression
SecureAgent delivers data between the connected machines in an optimized and compressed format.
This helps reduce communication delays over networks, including the Internet, as well as enhancing data security.
 

User Authentication
The SecureAgent handshake, or contentious logon protocol, authenticates the server and the client.
It uses a “Request-Challenge-Response” process that authenticates the user.

  • Passwords are never sent between SecureAgent and the remote machine

  • Recording of user logon data sent by remote machines is rendered virtually worthless with an aggressive “Request - Challenge - Response” process


Security Administration
All aspects of SecureAgent technology can be set up by your own security administrator from any location.

 




 

 

 

Specializing in Data Security, Disaster Recovery, and Virtual Tape Library Applications.  Home       About Us       Solutions       Products       Clients & Partners       News       Support       Contact Us

Legal Disclaimer