Germany | Bayern

Zurück zur Suche

Internationale Partnersuche

Innovation & Technologie Angebot

Plug & play technology for local and cloud data security in enterprises and SMEs

Country of Origin: Spain
Reference Number: TOES20170818001
Publication Date: 18 August 2017

Summary

A Spanish ICT company has developed an easy to integrate solution that combines CSG (Cloud Security Gateway) and NAS (Network Attached Storage) functions, with integrated on-site and off-site data protection. It provides immediate and automatic robust encryption, which allows having a secure and confidential backup in any storage provider –even in public clouds. The solution allows exclusive customer encryption key ownership and it is ransomware resistant. They seek for a license agreement.

Description

The volume of digital data is growing (estimation of 40 Zeta bytes by 2020) and at the same time the data management security has become more complex due to the backup policy and the legal compliance (some companies are obliged by law to safety store their data for long periods of time, GDPR, sensitive data, industrial property, etc.)

Also, when using hardware devices for storage, information is exposed to robbery, attacks and other risks. Cloud storage ensures availability but there is a growing concern about the real security of this system due to the user lack of control.

Currently, security solutions in the market address either local storage security or cloud storage security meaning that a solution combining both systems would provide higher reliability.

In this context, the Spanish ICT company, has addressed this problem by the development of a small plug & play hardware device that is connected to the user LAN (Local Area Network) and deeply encrypts cloud-bound data before the user leaves his home, office, etc. It also protects users from workplace loss, theft or damage since no files are stored locally.

The technology has different versions depending on the kind user. It is suitable for professionals, SMEs, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, etc.
It is especially useful for those companies that handle sensitive data and that are affected by the new GDPR (General Data Protection Regulation)

Key functionalities:
-Private & Automatic Cloud Backup
The solution performs optimized cloud backup for the entire local network, everything that is stored in it gets automatically encrypted and backed up in off shore storage services. The solution does not require installation of desktop software, ensuring smooth deployment and operation.

-No local Risk. Ranmsonware resistant
It provides resistance against remote and local attacks, damage, loss, theft and ransomware.

-Exclusive customer encryption key ownership
The solution manages all the cryptographic keys needed to encrypt all your files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key.

-Compatible with local and cloud storage
The solution is a device that merges Network Attached Storage (NAS) functionalities with many different cloud storage services in a way that your data confidentiality and integrity is assured.

Main features:
-Connection to the LAN (Local Area Network) by Ethernet cable.
-De-duplicated files for optimized bandwidth and file storage.
-Private and locally shared folders for each user.
-Security does not depend on passwords or key phrases generated by users.
-Easy Setup: It does not require installation of desktop software being as simple as working with a network-attached storage (NAS) server.
-Robust Encryption: AES (Advanced Encryption Standard) 256-bit encryption is immediate, automatic and round the clock.
-Exclusive customer encryption key ownership: The solution manages all the cryptographic keys needed to encrypt all the files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key.
-Legal compliance: Meets stringent international data protection and privacy laws
-It can be integrated to any system or IT infrastructure (Windows, Mac OS, Linux, iOS, Android)
-Ransomware Immunity: It is resistant to any kind of ransomware.
-Business device dimension: 131x131x52 mm.

This technology is suitable for private users, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, SMEs, journalists and freelancers, etc.

The company is looking for international ICT partners willing to cooperate under a license agreement in order to market this technology.
Image

Advantages and Innovations

-Main innovation offered by this solution is that the data owner is the one that performs the encryption and the one who owns the encryption codes,  so no external providers (for example cloud providers) have access to the information.

-Other data security solutions in the market address either local storage security or cloud storage security. On the contrary, this is the first solution in the market capable of removing all vulnerability from both cloud and local storage. It protects against local theft, leakage, loss or damage, since no unencrypted files are ever permanently stored locally.

-Provider Independence: Users have freedom to select the best combination of local or cloud providers for their business or personal information security needs.

Stage Of Development

Already on the market

Requested partner

The company is looking for two kind of partners:
-ICT integrators with expertise in data security solutions willing to market this solution within their area of influence.
-Cloud providers willing to improve their cloud service data security by incorporating this technology to their portfolio.

The kind of partnership sought is license agreement.

Kooperationsanfrage stellen