Security


When data is stored by Phoenix, its primary tier security structure remains intact. Permissions, access control lists, and other security settings are not only fully preserved, they are also utilized. Search operations display only data that the operating user is authorized to access. Users do not have access to and do not see data that they did not have permissions to access on while it was on the primary tier.

Beyond Heterogeneous Environment Support

Phoenix also preserves operating-system specific attributes, such as Windows streams and Mac resource forks. Should a file be retrieved to an operating system that is different from where it originated, Phoenix restores all the file attributes that are supported by the destination OS.

Benefits provided by Phoenix Security

  • Preservation of all access parameters
  • Preservation of OS specific attributes
  • Unauthorized users have no access to data
  • Retrieval of data to different operating systems