Infrastructure > Overview / Data Centers / Data Integrity and Security / Secure, Always-on Network / Monitoring and Management / Safe and Secure Locations
Data Integrity and Security
When dealing with millions of GBs of data (petabytes), the utmost care must be taken to ensure that customer data is protected and preserved by adhering to the highest standards of data security and by engineering systems that ensure the integrity of the data. Although many cloud service providers talk a lot about data encryption, most don’t discuss or provide mechanisms to protect the integrity of the data, which is equally as important. After all, what good is your data if it becomes corrupted or damaged?
The Dangers of Silent Data Corruption
Silent data corruption is a real threat to your data. In a study by CERN, silent data corruption was observed in 1 out of every 1500 files. Redundant storage, RAID, mirroring, checksums on individual components, replication, and even backup are not sufficient to protect against silent data corruption. If data is silently corrupted without detection, this corrupted data is then replicated or backed up, thereby corrupting any redundant or backup copies. The causes of silent data corruption are many and include hardware, firmware, and software faults.
eFolder's Unique Data Integrity Assurance Systems
Our data integrity protection systems are second to none. Our end-to-end 256-bit checksums “tag” your data with cryptographically verifiable identifiers, and these checksums are then used to verify the integrity of the data throughout the entire process. If corruption within a particular block is detected, a redundant copy of that block is used to automatically repair the corruption.
The redundant copies of the data are split across physically separate raw storage devices each located in physically distinct storage subsystems. Storing the redundant copies physically far away from each other ensures that clusters of disk failures due to localized vibration, enclosure failures, or IO controller failures do not affect more than one redundant copy of the data, providing an unparalleled level of protection.
In addition to automatic detection and repair upon data access, all data is periodically verified against their end-to-end checksums to proactively identify and automatically repair silent data corruption.
As an additional measure of data integrity assurance, every data block backed up to our cloud is digitally signed by your encryption key and then verified during restore. This provides cryptographic assurance that your data has not been tampered with by anyone and is 100% identical to what was originally backed up.
We’re also serious about data confidentiality. In addition to our in-depth network security mechanisms, our services adhere to stringent internationally accepted standards for data encryption and network transmission, including AES 256-bit, FIPS-197, NIST 800-38A, HMAC-SHA-256, PBKDF2, and RSA 3072-bit.
Learn more about eFolder's Cloud Infrastructure
Join Us Today
Learn more about our partner programs. Call us now at 800-352-0248 or contact eFolder online. We'll offer you a 60-day free partner trial. No credit card required. Offer free trials to your customers to gauge acceptance. We're confident that once you test drive our solution you'll want to begin offering it to your customers under your own brand and logo.
Or don't take our word for it, ask your friends in the channel and see if they are using eFolder! Chances are some of them have already joined our extensive partner network, like so many other resellers, VARs, and managed service providers have since our founding in 2002. Go ahead, ask them the tough questions! We can also provide references upon request, or watch what other partners have to say.
|Phone: 800-352-0248 | Email: firstname.lastname@example.org | Legal Notices | We're Hiring! | © 2002-2013 eFolder, Inc. All rights reserved.|