Data protection and business continuity are at the core of our business. We subscribe to the absolute highest standards of security, integrity and confidentiality for data storage, with systems, infrastructure and data encryption safeguards that ensure its validity and safety.
Silent data corruption is a real threat to business data today. Without proactive repair measures in massive storage environments, data that’s corrupted without detection can propagate, in turn corrupting redundant or backup copies. Our cloud technology uses end-to-end checksums to tag each block data with verifiable identifiers to validate integrity of data through the entire process. If corruption is found, safe redundant copies are automatically used for repair. Tagged, signed and encrypted copies are then stored on physically separate devices, assuring integrity. eFolder’s unique cloud architecture not only guarantees the integrity of each data block, but also guarantees correct write ordering and proper write cache flushing semantics.
eFolder adheres to the highest standards of data security by engineering systems that protect and maintain data, while ensuring its confidentiality. We insist on in-depth network security mechanisms and our services adhere to stringent, internationally-accepted standards for data encryption and network transmission, including AES 256-bit, FIPS-197, NIST 800-38A, HMAC-SHA-256, PBKDF2, and RSA 3072-bit.