Plug & play technology for local and cloud data security in enterprises and SMEs
A Spanish ICT company has developed an easy to integrate solution that combines CSG (Cloud Security Gateway) and NAS (Network Attached Storage) functions, with integrated on-site and off-site data protection. It provides immediate and automatic robust encryption, which allows having a secure and confidential backup in any storage provider –even in public clouds. The solution allows exclusive customer encryption key ownership and it is ransomware resistant. They seek for a license agreement.
The company is looking for two kind of partners: -ICT integrators with expertise in data security solutions willing to market this solution within their area of influence. -Cloud providers willing to improve their cloud service data security by incorporating this technology to their portfolio. The kind of partnership sought is license agreement.
The volume of digital data is growing (estimation of 40 Zeta bytes by 2020) and at the same time the data management security has become more complex due to the backup policy and the legal compliance (some companies are obliged by law to safety store their data for long periods of time, GDPR, sensitive data, industrial property, etc.) Also, when using hardware devices for storage, information is exposed to robbery, attacks and other risks. Cloud storage ensures availability but there is a growing concern about the real security of this system due to the user lack of control. Currently, security solutions in the market address either local storage security or cloud storage security meaning that a solution combining both systems would provide higher reliability. In this context, the Spanish ICT company, has addressed this problem by the development of a small plug & play hardware device that is connected to the user LAN (Local Area Network) and deeply encrypts cloud-bound data before the user leaves his home, office, etc. It also protects users from workplace loss, theft or damage since no files are stored locally. The technology has different versions depending on the kind user. It is suitable for professionals, SMEs, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, etc. It is especially useful for those companies that handle sensitive data and that are affected by the new GDPR (General Data Protection Regulation) Key functionalities: -Private & Automatic Cloud Backup The solution performs optimized cloud backup for the entire local network, everything that is stored in it gets automatically encrypted and backed up in off shore storage services. The solution does not require installation of desktop software, ensuring smooth deployment and operation. -No local Risk. Ranmsonware resistant It provides resistance against remote and local attacks, damage, loss, theft and ransomware. -Exclusive customer encryption key ownership The solution manages all the cryptographic keys needed to encrypt all your files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key. -Compatible with local and cloud storage The solution is a device that merges Network Attached Storage (NAS) functionalities with many different cloud storage services in a way that your data confidentiality and integrity is assured. Main features: -Connection to the LAN (Local Area Network) by Ethernet cable. -De-duplicated files for optimized bandwidth and file storage. -Private and locally shared folders for each user. -Security does not depend on passwords or key phrases generated by users. -Easy Setup: It does not require installation of desktop software being as simple as working with a network-attached storage (NAS) server. -Robust Encryption: AES (Advanced Encryption Standard) 256-bit encryption is immediate, automatic and round the clock. -Exclusive customer encryption key ownership: The solution manages all the cryptographic keys needed to encrypt all the files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key. -Legal compliance: Meets stringent international data protection and privacy laws -It can be integrated to any system or IT infrastructure (Windows, Mac OS, Linux, iOS, Android) -Ransomware Immunity: It is resistant to any kind of ransomware. -Business device dimension: 131x131x52 mm. This technology is suitable for private users, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, SMEs, journalists and freelancers, etc. The company is looking for international ICT partners willing to cooperate under a license agreement in order to market this technology.
Advantages and innovations
-Main innovation offered by this solution is that the data owner is the one that performs the encryption and the one who owns the encryption codes, so no external providers (for example cloud providers) have access to the information. -Other data security solutions in the market address either local storage security or cloud storage security. On the contrary, this is the first solution in the market capable of removing all vulnerability from both cloud and local storage. It protects against local theft, leakage, loss or damage, since no unencrypted files are ever permanently stored locally. -Provider Independence: Users have freedom to select the best combination of local or cloud providers for their business or personal information security needs.
Already on the market
Intellectual Property Rights (IPR)
Register your interest
How it works
- Tell us about yourself
- We’ll discuss with you
- We put the right partners in touch
EEN help you find the right partner, rather than you going it alone.
Our role is to review and collate the most suitable submissions, and then send them to the client who posted the opportunity. We consult with you, and the client, to make the process professional and easy.
These are live opportunities. Your registration of interest on the site is just like a professional approach to a business at a networking event. To stand the best chance of success, make your submission really sing. Sell why the client who posted the opportunity should work with you. Excite them. Ask questions. Try and avoid copy and pasting words from elsewhere.
Once the client has chosen their partner, we'll introduce them over email and keep in touch with both parties to see how it's going. Sometimes things progress quickly. Sometimes because of changing priorities for either party, things progress slowly, but you never know - your next big business break could start right here.
First we need to check you’re human.
Thank you for verifying your email. We have sent you a confirmation email containing a 6 digit verification code to unlock the form below