Secure Agent Software provides Disaster Recovery & Data Recovery SolutionsData Center Automation, Business Continuity, Disaster Recovery, & Off-Site Data BackupKeep the Data in Your VTL Safe & Secure with a Disaster Contingency Plan
                                        Featured Product:   Secure Data Solution®   "Securing Your Tape Backups"   >   Learn More                            Site Map
Secure Agent Software Home PageAbout UsSolutionsProductsClients & PartnersNewsSupportContact Us


      Secure Data Solution®    

Key Management

Most people would never leave their house key taped to their front door. Yet many operators are leaving their tape encryption keys in some very careless places and inviting thieves into their data. Keys are written on sticky notes, sent in e-mails, or shared with multiple employees. Sometimes keys are even written on the label of the encrypted tape!
But notes get lost and e-mails get deleted. Over time, people tend to forget where keys are kept. To prevent loss, keys are often left out for all to see, providing information access to anyone with a copy of the physical tape. Even encrypted data may still be vulnerable if the keys are exposed.

The Secure Data Solution® uses state-of-the-art patented and patent-pending methods to ensure both your data and passwords are safe. Our key management protocol is well established and used in data centers of many of the world’s largest corporations, as well as numerous Fortune 500 companies.

The Secure Data Solution provides proven key encryption security:

  • Random keys are automatically assigned when a security group is defined.

  • Keys are not written to encrypted tapes and data remains completely secure.

  • User IDs are kept separate from the data and are sent in an encrypted message.

  • Key creation and control is centralized and can be performed remotely with total security.

  • A patented "challenge and response" process ensures password safety.

  • Unauthenticated sessions are instantly terminated.

  • Since data is never transmitted in the clear, even if an unauthorized person intercepts it, it will be useless.

  • Always encrypts all transferred data for security.




Specializing in Data Security, Disaster Recovery, and Virtual Tape Library Applications.  Home       About Us       Solutions       Products       Clients & Partners       News       Support       Contact Us

Legal Disclaimer