Value Added

SCENARIOS

Ways how fragmentiX can improve your data security

DISASTER RECOVERY

If a lightning strikes, a fire breaks out or floods occur, data and work of entire companies will often be wiped out within seconds. There are many risks you and your company often won’t be able to withstand.

PROTECT SENSITIVE DATA ONLINE & OFFLINE

In addition to the various scenarios for using public cloud storages safely with fragmentiX appliances, you can also use the same principles locally.
Mitigate the need to trust a single entity by using a mixture of storage locations – hybrid or local.

MULTI-CLOUD BACKUP

Your data can disappear due to a myriad of reasons ranging from data corruption to enryption by ransomware. No matter the case, frequent backups can solve this problem.

However, the risks of public cloud storage inlcude data leakage or access by hackers, state sponsored actors or governments. All of these present real dangers to your sensitive data in backup files.

USE STORAGE TOGETHER WITH AFFILIATES

Together with partnering organizations / trusted entities, you can decide to share the burden of backups and other storage needs by fragmenting your data to all your federated datacenters.

LONGTIME ARCHIVE

To ensure that your data will still be available digital unchanged several years from now, using a cost-effective public cloud storage facility with a high level of failover and redundancy is a good idea.

By distributing the long-term archive across a larger number of cloud storage providers, you significantly reduce the risk of data loss.

SHARE DATASETS & BE SAFE

To rightfully share sensitive data with affiliates, the usage of mail or consumer cloud products is often neither legally nor technically acceptable.
By implementing a hybrid and federated storage system with fragmentiX, the configuration can be adapted in multiple simultaneous scenarios.

You can find an overview of these and more solutions in our application primer document, together with the datasheets of our appliances.

TECHNOLOGIES

Technologies used in fragmentiX products

APPLIANCES

Coming from the digital forensics business our founder and the other leading technicians understood very soon that the desired security level of the fragmentiX solutions is only achievable in a very strictly controlled environment. This starts with the supply chain of all components and ends with the protection of the access credential needed to communicate with various cloud storage providers. It would be easy to implement fragmentiX as a “software only” but it would not fulfill the required high level protection for sensitive data.

QUANTUM KEY DISTRIBUTION

Quantum Key Distribution (or QKD) is a method used to share encryption keys between two parties.

While Secret Sharing allows data to be secure while stored (data on rest), QKD technology can ensure the security of said data while being transferred from one location to another (data in transit).

fragmentiX is currently working on several projects combining Secret Sharing with QKD as its logical extension. 

SECRET SHARING

Secret Sharing was first published by Israeli cryptography expert Adi Shamir. Secret Sharing allows files and directories to be split up – fragmented – to a admin defined number of storage LOCATIONS – only known to the aplliances owner. This minmizes the risk to loose this data to hackers, thieves and spies.

MULTI-PARTY COMPUTING

In future versions of fragmentiX CLUSTER products, the functionality of multiparty computation (MPC) or secure multiparty computation (SMPC) will be made available as an option. MPC is a cryptographic technology allowing several parties to use all their data jointly for computations, without actually having to share and exchange their data with each other.

As a founding member of the MPC Alliance, fragmentiX wants to promote the use of MPC technology.

Any more questions?

en_USEN