Image

Secure Copy Evaluation-Guide

Secure Copy

Secure Copy DownloadDownload Secure Copy | Price - orderPrice - order Secure Copy
Secure-Copy

Secure-Copy Download
  • Copy data between servers with Security Intact
  • Replacement for Robocopy
  • SecureCopy is perfect for Migrations
Secure Copy Pricing

SecureCopy Evaluation Guide & Overview

SecureCopy 3 offers a complete solution for copying data, local groups and users, files shares and their security within a server, from server to server, or from a server to a storage device.

NTFS has added increased security and functionality to the file system options for Windows NT 4.0/2000/XP and later operating systems. Security can be set on files and folders as well as file shares, making it an excellent choice when building a secure system. There are however limitations to this implementation. The security assigned to objects in the NT file system can be lost through a variety of common and often necessary functions.
The simple process of copying data from one location to another will result in the loss of security, whether this is between partitions, computers or even on the same volume. Moving data will also result in security being removed unless it is only done within a partition. This can cause several nightmares in scenarios where data security must be maintained, such as corporate financial data or sensitive projects.
Secure Copy eliminates this problem by offering a vehicle for data copying and migration that leaves security exactly as it was meant to be. Using Secure Copy to copy data between partitions, hard drives or even from server to server, security is maintained.

Server and Data Consolidation Issues
Migrating data between volumes has several inherent problems that need to be tackled to effectively complete any data consolidation task. Here are some of the most commonly encountered issues:

  • Copying data without losing security on the data.

  • Handling automatic recreation of file shares with security on the new location.

  • Properly setting security for local groups and users on data migrations between machines.

  • Ensuring consistency of the source and target data.

  • Automating processes to ensure that data is copied during off-peak hours.


Solutions

Issue 1: Copying data without losing security on the data.
When data is copied within an NTFS volume, security is lost. When data is copied or moved from one NTFS volume to another, security on the data is again lost. Limitations within the NT file system only allow data to maintain its security when it is moved within the same volume. Any migration project beyond that will require administrators to manually reset ACLs (Access Control Lists) on the data. This can often span hundreds of thousands of files and folders and be impossible to accomplish in any amount of time. All the while there is a chance for human error and inconsistency, leading to data being compromised.

Secure Copy easily solves this by properly setting security on data that is copied during the copy process. This means that data that is copied between volumes or even computers will have security set to exactly what it was before the copy occurred. At no time is the data security vulnerable.

Issue 2: Handling automatic recreation of file shares with security on the new location.
When data is copied from one location to another, any associated file shares are left on the original data. The file shares must be manually recreated and have share level security set on them. The difficulty in migrating data becomes obvious when ones takes into account that many corporations can have hundreds or thousands of file shares within a directory structure.

Secure Copy provides options to allow administrators to have incredible flexibility to migrate file shares. Each option allows for shares to be recreated with original share security intact, all seamlessly during the copy process. Users will immediately have access to the new share points.

Issue 3: Properly setting security for local groups and users on data migrations between machines.
Local groups and users are unique to the computer or domain that they were created on. These local groups and users on computers exist in each computer"s SAM database and cannot be used to set security on files and folders outside of that machine. Any attempt to do so will yield an ?Account Unknown?. Moving data between servers means creating new local groups or users on the target server and then adding the appropriate groups and users to those groups, then manually resetting security on the data after it is copied. Again the potential for disaster is huge as is the time to perform such a function.

Secure Copy transparently handles this task for administrators. When data is copied between servers, Secure Copy looks at the ACLs on the data and determines the account or group and its type. If Secure Copy finds that a group is local it can migrate this group to the new server and properly set membership for the group. As Secure Copy migrates the data it will translate the security between the original groups and users and the new groups and users, keeping the security in tact.

Issue 4: Ensuring consistency of the source and target data.
If an administrator copies data between two servers this data will lose any security set on it. The administrator will then have to take time and man power to correct the security of the data. Barring the temporary loss of security which can be fatal to a company"s security directives, there is a large possibility that the security will never be exactly the same.

Secure Copy automates the process of setting security on files, folders and file shares as it copies data. This eliminates the guesswork of whether or not data security is consistent with the old server.

Issue 5: Automating processes to ensure that data is copied during off-peak hours.
The dynamic nature of today"s large enterprise networks makes a data migration difficult due to heavy file system usage. Migrations can often slow down access to files or miss large amounts of files that are locked by processes. Performing a consolidation or migration during normal business hours is most often not an option.

Secure Copy provides administrators with the ability to perform migrations during off-peak hours through use of scheduling. Secure Copy uses the Microsoft Task Scheduler service to provide a common way to schedule copy jobs to run after hours. All an administrator needs to do set up the copy the way they want it to be and all necessary information is fed to the service. There is no need to formulate a custom command line.

Function Overview
Graphical Source and Target Selection Secure Copy offers users the ability to select multiple source and target location with an easy to use GUI. The GUI allows users to browse their entire network including Active Directory for the paths or servers that will be involved in any copy processes

Multiple Source and Target Path Selection
Consolidation projects often require multiple servers to be reduced to only one. Such is the case with data migration to a large Network Attached Storage device. Secure Copy provides a simple method of performing these jobs in one simple step.

Create Initial Source Folder Under Target Folder
This function allows Secure Copy to create a folder to be used as the root of any copy, within the specified target path.

SecureCopyCMD and SecureJobCopy3
Secure Copy offers two forms of command line interfaces to perform all functions that can be performed from within the GUI. Scheduled jobs can easily be run or custom scripts can be developed to add greater flexibility to copy jobs.

Test Job
Secure Copy features the ability to test copy jobs without actually performing any data migration. This allows administrators to see if there will be any errors associated with rights or various other problems that could hinder a consolidation.

Schedule
All jobs that can be run manually with Secure Copy can be run using the schedule function. Secure Copy uses the Windows Task Scheduler service to run scheduled copy jobs in an easy to use and understand interface. All copy job parameters are passed to the Task Scheduler to make setup a snap.

Save, Load and Delete Job
These functions allow administrators to manage jobs that may be repeated or modified for use at a later time. There is no need to manually recreate frequently used jobs. Saved jobs can be easily identified and loaded from within the GUI or invoked through the command line interfaces.

Copy All Files... or Copy Only Changed Files...
Secure Copy offers the ability to select how existing files or incremental copy jobs are to be handled. Administrators can copy all files from the source path to the target path, or choose to only copy files that have changed. Changed files will only be copied to the target if they are newer, preventing newer files on the target from accidentally being overwritten.

Synchronize Target with Source
For administrators who want to make identical source and target paths, Secure Copy introduces the ability to delete orphaned files from the target path. Essentially, all files that are not part of the copy job are purged from the target. This function is excellent for removing files that no longer exist in the source, but may have been copied over time.

Override Security on Access Denied
Administrators no longer need to have explicit access in order to copy data. In fact administrators can be denied access to data, but still copy it from the source to the target, all the while maintaining security and ownership of the original account.

Don"t Copy Permissions
For those administrators who only want data to be copied without any security, Secure Copy provides this indulgence. The same easy to use GUI sets up even your most basic of copy jobs.

Log File Generation
Secure Copy will log errors or any events that may occur during a migration. A simple log file will yield only errors, while a verbose log will allow administrators to verify that every file and folder was copied exactly as it was meant to be. Reset Last Accessed Date on Source Files Copying data will cause it to get the last accessed date of the date and time during which the data was copied. Secure Copy can set this date back to what the source was using this function.

Synchronize Last Accessed Date and Created Date on Source w/Target
This advanced option allows Secure Copy to set the last accessed date and created date on the target to exactly what they were on the source, creating an identical copy of the data and security.

Always copy perms, even on skipped files
Secure Copy will copy permissions on files and folders if they have changed even if the files and folders themselves are not copied. This can make repairing simple copy or xcopy jobs a simple task. There is no need to copy data, just security.

Clear Archive Bit on source after copying
Secure Copy will function like a backup program if this option is selected. Otherwise Secure Copy will not set the archive bit on copied data.

Set Password for migrated user accounts
Secure Copy can set the password for all user accounts that are migrated using it. This allows for an extra measure of security. All migrated user accounts are required to change their passwords at first logon.

Compression Options
When space is a concern, Secure Copy enables administrators to specify how compression is handled. Secure Copy can uncompress data, compress it, or compress data based on how it was stored on the source, making consistency of source and target no challenge at all.

File Share Migration
Secure Copy can be used to migrate file shares that are associated with data that is being copied. Several flexible options allow administrators to completely control how share migration is regarded. Secure copy even allows file shares to be recreated on clustered environments by using or creating Cluster Resource Groups.

Local User and Group Migration
Quite often groups and users must be migrated to ensure data security. Secure Copy offers incredible flexibility in the matter. Groups and users can be migrated between servers or into Active Directory or an NT 4.0 domain environment. Options allow for group names, memberships and the like to be tailored to individual corporate needs.

Filtering of Files
Secure Copy can restrict which files are copied, based on file filtering criteria. This filtering capability allows for folders of certain names to be excluded and files to be included or excluded based on file extension. For example, files that end in .tmp, and folders named "Temporary Internet Files" can be prevented for inclusion in the migration.

Suggestion Box
Your comments can help make our site better for everyone.

If you've found something incorrect, broken, or frustrating on this page, let us know so that we can improve it.

USA
Image
Select Country
Switzerland
Denmark
Finland
France
UK
Norway
Sweden
USA
Products
Active Administrator
ChangeAuditor for Windows File Servers
Desktop Authority
Desktop Authority Express
Desktop Authority MSI Studio
Desktop Authority Password Self Service
Enterprise Security Reporter
Help Desk Authority
Hyena
Patch Authority Ultimate
Print Manager Plus
Privilege Authority
Quest Change Base
Ramdisk Plus
Secure Copy
Security Explorer
Product Category
All products
Active Directory
Administration
CITRIX
Compliance
Data Replication
Deployment
Event Monitoring
Exchange
Help Desk Management
High Availability
Management
Network Management
NTFS
Remote Control
Reporting
Scripting
Security
Server Management
Sharepoint
SOX in Europe
User Management
Utilities
 
Updated Pages
Updated:7/4/2012
Active Administrator Updates and Upgrades
Updated:7/4/2012
Hyena Enterprise Edition
Updated:7/4/2012
Hyena Download and Purchase at best price from AMT Software International
Updated:7/4/2012
Managing rights on SecurityExplorer
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Hyena - Price
Updated:7/4/2012
Sharepoint Access Right Reporting
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers