NC-Syncom Modernization Guide
NC-Syncom is a sharing product by Dell Computer Corporation. Explore technical details, modernization strategies, and migration paths below.
Product Overview
NC-Syncom is a middleware product designed to synchronize passwords across diverse systems and platforms, particularly those involving mainframes.
It is especially useful for enterprises in regulated industries like banking and finance.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does NC-Syncom do?
NC-Syncom synchronizes passwords across different systems and platforms, ensuring consistent credentials for users accessing various resources. It helps maintain security and simplifies user access management.
Is this a system, application, or tool?
NC-Syncom is a middleware solution that sits between different systems and applications, facilitating the exchange of password information. It is not a standalone application but rather a component that enhances existing identity management infrastructure.
What types of organizations use this?
Organizations that rely on multiple systems and platforms, especially those with mainframe environments, benefit from NC-Syncom. These include large enterprises in banking, finance, insurance, and government sectors where consistent password policies are critical.
When should we consider NC-Syncom?
A company should consider NC-Syncom when they need to enforce consistent password policies across diverse systems, reduce help desk calls related to password issues, and improve overall security by ensuring synchronized credentials.
What are the alternatives to NC-Syncom?
Alternatives to NC-Syncom include Vanguard ez/Signon, IdentityForge Advanced Adapter, and other custom-built password synchronization solutions. Each has different features, integration capabilities, and costs.
Technical
For mainframe products: Does this run in an LPAR?
NC-Syncom typically runs on z/OS and requires specific subsystems to be present. It is often deployed in an LPAR to isolate it from other workloads. It extends and enhances existing security products.
What infrastructure is required?
NC-Syncom requires existing infrastructure such as a security management system (e.g., RACF, ACF2, Top Secret) and network connectivity between the systems it needs to synchronize passwords across.
Does NC-Syncom have an API?
NC-Syncom exposes APIs, possibly including REST or SOAP, to allow integration with other systems. These APIs facilitate the exchange of password information and allow for customized synchronization workflows.
What are the main system components?
The main system components include a synchronization engine, communication modules, and data storage. These components communicate via network protocols to exchange password information between systems.
Business Value
What business problem does it solve?
NC-Syncom solves the business problem of inconsistent passwords across different systems, which can lead to security vulnerabilities and increased help desk costs. By synchronizing passwords, it improves security and reduces administrative overhead.
What would happen if an organization did NOT use this product?
If an organization does not use NC-Syncom or a similar product, they may face challenges such as inconsistent password policies, increased security risks, higher help desk costs, and reduced user productivity due to password-related issues.
How does this product integrate with enterprise ecosystems?
NC-Syncom integrates with enterprise ecosystems by providing APIs and interfaces that allow it to connect with other identity management systems, security platforms, and applications. This integration ensures seamless password synchronization across the enterprise.
Security
What specific authentication methods are supported?
NC-Syncom supports authentication methods such as LDAP, Kerberos, and multi-factor authentication (MFA). It uses an access control model based on roles (RBAC) to manage user permissions and access to resources.
What encryption is used and where?
NC-Syncom uses encryption to protect password data both in transit and at rest. It also provides audit logging capabilities to track password changes and access attempts, helping organizations meet compliance requirements.
What audit/logging capabilities exist?
NC-Syncom provides audit and logging capabilities to track password changes, access attempts, and other security-related events. These logs can be used for security monitoring, compliance reporting, and incident investigation.
Operations
How is this product typically deployed?
NC-Syncom is typically deployed on-premise or in a hybrid environment, requiring technical expertise to implement and maintain. Ongoing operational requirements include monitoring, maintenance, and staffing to ensure the system runs smoothly.
What administrative interfaces are available?
NC-Syncom provides administrative interfaces such as a command-line interface (CLI) and a web console for managing users, configuring parameters, and monitoring system performance. User management is handled through integration with existing directory services.
What are common implementation challenges?
Common implementation challenges include integrating with diverse systems, configuring password policies, and ensuring secure communication between components. Proper planning and testing are essential for a successful deployment.
Ready to Start Your Migration?
Download our comprehensive migration guide for NC-Syncom or calculate your ROI.