-
Role-based access
controls.
-
Patented authentication
logon protocol ensures only authorized users have access.
-
Combined with role-based
access controls.
-
Our logon protocol helps
prevent attacks not only by outsiders, but also by negligent or
malicious insiders.
-
Encryption of all
communications between the IDG 9074® and clients ensures
security of the data stream.
-
Access and activity logs
provide auditability.
-
Unauthorized personnel cannot access log files.
-
Easy-to-use GUI-based
administration program.
-
Secure remote access
means disaster recovery plans can be supported and maintained
from any location.
-
Our patent-pending
Instant Replay feature presents a scrollable history window
showing a keystroke-by-keystroke.
-
Instant Replay captures
refreshed screens and saves memory. Instant Replay is also
useful in training.
-
Secure Telnet clients
included at no additional charge. Connections can also be made
through SSH or SSH2.
-
Includes easy-to-use
REXX programming language that allows quick automation of
operating system commands.
-
Provides security
administrators with an “over-the shoulder” view of operators
with root access without the operators knowledge, allowing for
real-time, proactive monitoring, even of multiple consoles
simultaneously.
-
The IDG 9074 is an
“out-of-the-box” solution that installs quickly and does not
require intensive training of security administrators.
-
The IDG 9074 can connect
to multiple Unix servers. An alternate IDG 9074 can provide
redundancy. The combination of a primary and alternate is far
more affordable than other solutions priced on the basis of an
entire server farm.