Secure Data
Solution®
|
Key Management
Most people would never
leave their house key taped to their front door. Yet many
operators are leaving their tape encryption keys in some
very careless places and inviting thieves into their data.
Keys are written on sticky notes, sent in e-mails, or
shared with multiple employees. Sometimes keys are even
written on the label of the encrypted tape!
But notes get lost and e-mails get deleted. Over time,
people tend to forget where keys are kept. To prevent loss,
keys are often left out for all to see, providing
information access to anyone with a copy of the physical
tape. Even encrypted data may still be vulnerable if the
keys are exposed.
The Secure Data Solution® uses state-of-the-art patented and
patent-pending methods to ensure both your data and
passwords are safe. Our key management protocol is well
established and used in data centers of many of the
world’s largest corporations, as well as numerous
Fortune 500 companies.
The Secure Data Solution provides proven key
encryption security:
-
Random keys
are automatically assigned when a security group is
defined.
-
Keys are not
written to encrypted tapes and data remains completely
secure.
-
User IDs are
kept separate from the data and are sent in an
encrypted message.
-
Key creation
and control is centralized and can be performed
remotely with total security.
-
A patented
"challenge and response" process ensures
password safety.
-
Unauthenticated sessions are instantly
terminated.
-
Since data is
never transmitted in the clear, even if an unauthorized
person intercepts it, it will be
useless.
-
Always
encrypts all transferred data for
security.
|
|