Skip to end of metadata
Go to start of metadata

Datomia® delivers the benefits of secret sharing schemes to storage by combining information dispersal with military level encryption. This preserves data confidentiality and integrity in the event of any of the Data AtomsTM being compromised.

Datomia®’s methods of data coding mean the information can only be deciphered if all the information is known. This eliminates the need for key management while ensuring high levels of key security and reliability. Data can be packaged with AES-256/SHA-256 encryption, which is validated for use in the most security conscious federal environments. 

Datomia®’s patent pending Data DNA® encoding technology ensures no original sequence of information remains in the final Data AtomsTM.

Datomia® uses the very nature of cloud computing to both protect and secure data. The data is encoded into Data AtomsTM that are spread seamlessly across multiple storage nodes in multiple geographic locations on single or multi private, public and hybrid cloud configurations.

The algorithms in Datomizer® then allow the owner of the data to locate and reassemble the data as required at any geographic place. For example, if up to 6 of 16 data centers are down, 100% of the data is still reassembled. In addition, if data from any of data centers is stolen, no data can be reconstructed. As a result, the cost of replication is cut by 75%, and it avoids the processing and management overheads of encryption. 

Resilience to Device Failure

This resiliency to device failure also works if an entire cloud service or data center is destroyed in a natural or man-made disaster.

The Benefits of Failed Node Protection

Datomizer® Failed Node Protection technology provides two major benefits:

  1. Built-in disaster preparedness
  2. Spreading data across many different locations makes it easier to share data to other locations, without the overhead and bandwidth load of traditional data replication technologies and content delivery networks

The Advantages over Alternative Systems

Failed Node Protection makes sure data is always-on and available regardless of planned or unplanned downtime, even in disaster scenarios, guaranteeing 100% uptime of the data storage. The advantages are:

  • At petabyte to exabyte scale, RAID does not provide acceptable protection from data loss.
  • Today’s backup and replication approaches can’t keep up with typical ingest rates at this scale.
  • Asynchronous replication is inherently vulnerable to data loss (“data in flight during disaster”).
  • As drive sizes grow, RAID rebuild time increases which create more vulnerability to a second, possibly irrecoverable, failure.

 

  • No labels