1 / 8

SODA Archiving

SODA Archiving. October 2013. info@redskiesgroup.com www.redskiesgroup.com. SODA Archiving. Secure data storage in the most secure, government trusted data centres Data transmitted and stored in its encrypted form Industry leading data access control

vinson
Télécharger la présentation

SODA Archiving

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SODA Archiving October 2013 info@redskiesgroup.com www.redskiesgroup.com

  2. SODA Archiving • Secure data storage in the most secure, government trusted data centres • Data transmitted and stored in its encrypted form • Industry leading data access control • Encryption keys stored on premises, in a secure government computing facility or at any site designated by customer • Data only accessible to customer • All the security features of SODA • Very low cost storage www.redskiesgroup.com

  3. SODA core strengths www.redskiesgroup.com

  4. Savings www.redskiesgroup.com

  5. Process www.redskiesgroup.com

  6. End to end data privacy New data security protocols developed with Microsoft, protect data from the meter through the full system to third party smart software. Industry leading data privacy applied to all smart systems automatically, improving all smart systems for free. www.redskiesgroup.com

  7. Extreme Levels of Security – SODA Secure • New state of the art security and privacy protocols developed in partnership with Microsoft • We support data signing and encryption with separate keys for each legacy device or a single key for all legacy data • Data is transmitted securely from end to end • Data is stored still encrypted with the signature if available as proof • Third parties requesting data can be authenticated against up to 3 unrelated remote authorities held in 3 different secure locations. Common solution is one authority held on customers premises or secure government storage facility • Authorised requests are supplied with encrypted results to decrypt at client site • Worlds most secure data centres that include ISO/IEC 27001:2005 Audit and Certification & SSAE 16/ISAE 3402 Attestation Control 1 (SOC 1) Type 2 report www.redskiesgroup.com

  8. Triple certificate authority security model www.redskiesgroup.com

More Related