Some questions come up more often – so we decided to try to answer them right away!
Why is fragmentiX not available as a Service? Why a hardware box?
Coming from the digital forensics business our founder and the other leading technicians understood very soon that the desired security level of the fragmentiX solutions is only achievable in a very strictly controlled environment. This starts with the supply chain of all components and ends with the protection of the access credential needed to communicate with various cloud storage providers. It would be easy to implement fragmentiX as a “software only” but it would not fulfill the required high level protection for sensitive data.
Who can access the buckets holding a fragment of my data?
Everyone who has the correct login credentials (or was able to hack/breach into the server/provider) can access tha data/fragments in the S3 bucket.
All the available methods to protect a S3 bucket are exactly the same – no matter if you have your original data stored in a particular bucket – or a fragment that was produced by your fragmentiX appliance. The big difference is that with a fragment of your original data even the owner of a future quantum computer can not learn anything about the original data.
As a plain user without extensive IT skills - is it possible to install and use fragmentiX technology ?
Yes – one of our most important design principles in creating fragmentiX was “ease of install and usage”. Since only really fully automated IT protection works – at least this is our strong and educated opinion on this – we made sure that after a ontime setup that is done easy using a web-interface – everything is “magically” done by our appliances. The user experience then is exactly the same as using a standard network drive on their PC or Mac.
Why should I trust fragmentiX? How can I be sure that they do not spy on my data?
Good and valid question! Since we are a privatly held corproation in the geopolitically neutral country of Austria / Europe we had the luck not to be intimidated by government or law enforcement to include backdoors or other ways to compromise the security and privacy we can provide to our customers. As our clear vision is to bring digital sovereignty to our customers, we try very hard to do everything possible to achieve this. Only the owner/user of a fragmentiX appliance knows how they configured the system – so not even we as the developers and producers of the appliances have any way to learn this secret configuration data. The sensitive configuration data includes usernames, passwords and the credentials (again usernames/passwords and URLs etc.) of the LOCATIONS – the places where the actual fragments are stored. Please ask us for more details on how we protect this sensitive information!
Can I use fragmentiX to exchange sensitive data with partners?
Yes, definitely you can. Since you can communicate the necessary LOCATIONS information – the buckets and the credentials to this buckets – with your partners, it basically works like it would with a single S3 bucket: whoever has the proper credential can access the data.
Want to know more?
If you have any questions not answered on our website, please do not hesitate to contact us.