Nexsan Logo

Assureon’s advanced archive and security features make it ideal for primary storage optimization, regulatory and corporate compliance, and the secure, long-term retention of files.

It offloads data from primary storage to free up space for active data and greatly reduces the size, cost and complexity of backups.

Security features comply with corporate and governmental regulatory requirements including HIPAA, SOX and SEC-17.

» »  As malware   is now also targeting backups, Unity with Assureon® delivers an immutable Unbreakable Backup solution so you never have to worry about your ability to recover from ransomware attacks.  See Below

 

SECURE ARCHIVE STORAGE

There is some data that is too private to be seen and too important to be lost, important to tampered with or lost, but you have tight budgets and time constraints.

Up to 80% of data on primary storage is unstructured and either never changes or changes infrequently but it’s imperative that you keep and protect this data.

This data can be easily offloaded from expensive primary storage to cost-effective Nexsan Assureon archive storage without any disruption to ongoing operations.

Assureon is designed to be tamper-proof from even the harshest ransomware attacks.

There is some data that is too private to be seen and too important to be lost, important to tampered with or lost, but you have tight budgets and time constraints. Up to 80% of data on primary storage is unstructured and either never changes or changes infrequently but it’s imperative that you keep and protect this data. This data can be easily offloaded from expensive primary storage to cost-effective Nexsan Assureon archive storage without any disruption to ongoing operations. Plus Assureon is designed to be tamper-proof from even the harshest ransomware attacks.

Learn more about how the Unity Active Archive work with the Assureon 

File Fingerprinting – Fingerprints using both MD5 and SHA1 hash of content and metadata, insuring history and contents cannot be altered after the fact.

File Redundancy – Makes two copies of the file and its fingerprint are stored in a separate RAID disk set either in the same system or a remote one.

File Serialization – Serial numbers are assigned to each individual file to ensure no files are changed, missing, or inappropriately added.

Secure Time Stamp -Use of a global, redundant, secure time source using Stratum Level 1 hardware time sources to ensure accurate time stamp.

Auto File Repair – Continually verifies against fingerprints and repairs using copies and safeguarded by RAID disk arrays for days or even decades.

Regulatory Compliance – Governmental and Corporate compliance of HIPAA, GLBA, Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), SEC 17A-4 and PCI DSS.

Secure Cloud Archive – Files are individually encrypted with its own AES-256 key to provide separation, security, and reporting of data for each client, enabling easy import into billing systems.

Storage Optimization – Archiving unstructured and infrequently used data frees up primary data and dramatically reducing the size, time and cost of the backup process.

Data Longevity – Ensures adherence to guidelines for data retention, disposition, privacy, protection, chain of custody, litigation readiness and risk mitigation.

assureon-data-sheet

assureon-spec-sheet

Unbreakable Backup Mitigates Cyber Security Threats

Modern cybercriminals still use “email spoofing” as the primary method of attack, with 67% of network infiltration resulting from spam. However, instead of hackers locking access to the compromised computer or account, hackers “scan” network traffic, recording system administrator credentials and addresses of sensitive data. Once this information is compromised, hackers encrypt and/or delete petabytes of valuable data, causing irreversible reputational damage, regulatory fines, costly downtime, loss of customers, and ransom expense. In addition, paying ransom does not mean getting all data back or hackers leaving your network. Backups used to be considered a recovery option, but cybercriminals found backdoors in to delete or encrypt the backups as well. Protecting your backups starts with taking data security, integrity, and availability one step further than before.

Encryption is a standard practice amongst current data backup solutions but must be improved upon to handle the new wave of attacks. On top of encrypting individual files (data at rest), the connection to the NAS or SAN must be encrypted as well. Encryption keys should be changed regularly, and all users must be required to pass multi-factor authentication (MFA). Data integrity is the most important aspect to a backup and is key to restoring data in a ransomware attack. Data should be stored in an immutable copy and consistently checked for errors or changes. Lastly, accessibility determines how quickly a company rebounds after an outage or attack. Data must be stored in multiple locations and on multiple sources and continuously cross-checked to ensure data is not altered.

At Nexsan, we solve these challenges with our Unbreakable Backup solution which delivers an immutable solution to mitigate cyber security threats. Unbreakable Backup safeguards data integrity and deploys with Windows, Veeam, Commvault, and many other environments. Data is protected by individually encrypting each file to the AES-256 standard and changes the keys every 30 days with MFA for system access. Automatic periodic data integrity checks are performed utilizing a unique “fingerprinting” system, which finds and fixes errors, eliminating the need for a system administrator to manually validate. Lastly, files are stored in pairs and in multiple locations, guaranteeing access to critical backups in case of an outage

Ransomware is the most serious threat facing organizations today in an increasingly cyber environment. CIOs and CISOs must arm their organizations with modern solutions to modern attacks or risk serious financial implications.