Security, Availability, Internal Breach
Data is vulnerable if a hacker compromises a single server
Users cannot customize availability by location or parity servers or add a server on the fly with automatic sync.
Since AWS controls data access and security, a breach or censorship could leave apps without access to their data.
Ultra secure storage to protect against internal breach and exceed GDPR compliance.,
Dynamic availability with always-on recovery and by adding servers on the fly and configuring based on brand, performance, and location.
Data is fragmented across multiple servers, each secured with a unique Split Key, ensuring that even if a server is hacked, neither the private key nor the data is compromised.
Users own their keys and data, control its location, and assume all liability, relieving the platform of any GDPR liability.
Effortless Encrypted Sharing with Proxy Keys and Ultra-Secure Shared Drives via Split Keys
1 Gbps
Limited
Slow after 1-10M files
Up to 1 Tbps
100% Dynamic with always-on recovery and add & replace servers
Less than 100ms
Centralized architecture, data stored in owned and operated servers
Distributed architecture, data fragmented across servers with distributed keys in geolocation of choice
A single key and password make both client and server vulnerable to data loss in the event of a hack.
Split Key protects both client and server from data loss or malicious activity, even in the event of a hack
AWS does NOT take full responsibility for data breach
Exceed GDPR compliance with customer data ownership and control with their Private Key
Need a separate secured platform to share data
Effortless Encrypted Sharing with Proxy Keys and Ultra-Secure Shared Drives via Split Keys