WHAT IS IT LIKE
TO BE IN CONTROL
OF YOUR DATA?

Do you want to find out?

fragmentiX™ enables you control over your data

Data usage only by yourself!

fragmentiX™ creates fragments that are stored on different storages. No single actor can use your data.

Protecting your privacy

fragmentiX™ takes the security and reliability of your data to a new level. Only you and people you want to have access to your data can use it.

Highest data availability

fragmentiX™ increases data availability through geographical dispersion.

Digital Long-term storage without data loss

fragmentiX™ enables long-term storage with minimal risk of data loss by determining storage resilience via the frX-Ratio.

fragmentiX™ Storage Appliances

fragmentiX™ ONE
  • personal & SME environments

  • for work groups & SMEs with up to 10 people
  • 1 or 2 WAN ports for internet access
  • up to 8 fragment storage locations usable
  • save fragments to any mix of public and private S3 storages and all local USB storage media
fragmentiX™ THREE
  • departmental and workgroup environments

  • for work group & SMEs with up to 30 people
  • up to 4 WAN ports for internet access
  • up to 16 fragment storage locations usable
  • save fragments to any mix of public and private S3 storages and all local USB storage media
fragmentiX™ FOUR
  • providers, companies and governments

  • for large groups & orgs mit mehr als 30 people
  • up to 8 WAN Ports for internet or VPN connections
  • up to 26 fragment storage locations usable
  • save fragments to any mix of public and private S3 storages and all local USB storage media

technical data: fragmentiX™ storage appliance

fragmentiX™ Storage appliances are designed and developed as a technical tool for digital self-defence and to strengthen digital sovereignty.

For this purpose, scientifically established algorithms for fragmentiX™ "Secret Sharing" are used. "Secret sharing" means splitting the data into several parts and storing them on different locations. fragmentiX takes the security and reliability of your data to a new level. No single provider can steal your data.

SIMPLE USAGE. Directories and files that are copied or moved to these "fragmentiX ™ drives" are divided into several FRAGMENTS and stored on the storage locations defined for them. These FRAGMENTS are then made available to the users at the network drive/share by these storage locations for "reading" or editing. To the users it is not obvious that data is stored with fragmentiX™ and not on the local file server.

CONTROL OF CONFIGURATION. A separate configuration can be created for each conceivable use case. By specifying the "frX-Ratio" you determine how many of the generated FRAGMENTS are required to restore the original data. The smallest "frX-Ratio" of 2/3 or "2 out of 3" means that out of 3 generated FRAGMENTS at least 2 are required to restore the data. It does not matter "which 2" files from the set of 3 FRAGMENTS are available - all FRAGMENTS are equal. The same works for other "frX-Ratios" like e.g. "4/10" or "7/18".

Changes to the configuration can only be made by an administrator via a specially protected WEB interface. The use of state-of-the-art Crypto-USB sticks ensures that all safety-relevant data can only be read on the respective fragmentiX ™ box and modified only by the authorized admin. Without the uniquely named YELLOW "CONFIG ENABLE" USB stick, no one can access the sensitive information.

CHOOSABLE FRAGMENT LOCATIONS. All data stored "on" a fragmentiX™ Storage Appliance is stored after the cryptographic division in FRAGMENTS on the defined storage locations - NO DATA LOCALLY remains on the Storage Appliance

Three storage types can be selected as storage locations:

Due to the increased redundancy provided by the fragmentiX™ Storage Appliance, cheaper storage providers can be combined with premium providers and/or local S3 storage. It is also possible, for example, to split sensitive data for individual applications only on USB sticks and thus work completely without cloud services.

LONG-TERM AVAILABILITY. The different memory types can be combined in any way and thus enable a multitude of possible effects such as extreme resilience or digital long-term availability.

INFORMATION-THEORETICAL SECURITY. Thanks to their secure and hardened architecture and the use of secret sharing algorithms that have been tested over many years, fragmentiX™ storage appliances offer a solution with a cryptographic guarantee. No single FRAGMENT contains usable information for an attacker or data thief. No part of the original file can be restored or cracked. By the self-determined number of the generated and the necessary number of FRAGMENTS again for reading can be guaranteed that only the possession of this minimum number of FRAGMENTS makes a READ possible.

Specs and pricing may change without prior notice.

fragmentiX™ is in close cooperation with AIT

Austrian Institute of Technology