|
Secure Data Solution®
|
Key Management
Most people would never leave their
house key taped to their front door. Yet many operators are leaving
their tape encryption keys in some very careless places and inviting
thieves into their data. Keys are written on sticky notes, sent in
e-mails, or shared with multiple employees. Sometimes keys are even
written on the label of the encrypted tape!
But notes get lost and e-mails get deleted. Over time, people tend to
forget where keys are kept. To prevent loss, keys are often left out for
all to see, providing information access to anyone with a copy of the
physical tape. Even encrypted data may still be vulnerable if the keys
are exposed.
The Secure Data Solution® uses state-of-the-art patented and patent-pending
methods to ensure both your data and passwords are safe. Our key
management protocol is well established and used in data centers of many
of the world’s largest corporations, as well as numerous Fortune 500
companies.
The Secure Data Solution provides proven key encryption
security:
-
Random keys are
automatically assigned when a security group is defined.
-
Keys are not written to
encrypted tapes and data remains completely secure.
-
User IDs are kept
separate from the data and are sent in an encrypted message.
-
Key creation and control
is centralized and can be performed remotely with total security.
-
A patented "challenge
and response" process ensures password safety.
-
Unauthenticated sessions are instantly terminated.
-
Since data is never
transmitted in the clear, even if an unauthorized person intercepts
it, it will be useless.
-
Always encrypts all
transferred data for security.
|
|