Perché fragmentiX non è disponibile come servizio? Perché una scatola hardware?
Coming from the field of digital forensics, our founder and technicians very quickly realised that the desired level of security of fragmentiX solutions can only be achieved in a very strictly controlled environment. This starts with the supply chain of all components and ends with securing the access authorisation required for communication with various cloud storage providers. It would be easy to implement fragmentiX as a “software-only”-solution, but this would not fulfil the required high level of protection for sensitive data.
Chi può accedere ai bucket che contengono un frammento dei miei dati?
Everyone who has the correct login credentials (or was able to hack/breach into the server/provider) can access the data fragments in the S3 bucket.
Tutti i metodi disponibili per proteggere un bucket S3 sono esattamente gli stessi - non importa se avete i vostri dati originali memorizzati in un particolare bucket - o un frammento che è stato prodotto dal vostro apparecchio fragmentiX. La grande differenza è che con un frammento dei tuoi dati originali anche il proprietario di un futuro computer quantistico non può imparare nulla sui dati originali.
As a normal user without extensive IT skills - is it possible to install and use fragmentiX technology ?
Perché dovrei fidarmi di fragmentiX? Come posso essere sicuro che non spiano i miei dati?
Good and valid question! Since we are a privately held corporation in the geopolitically neutral country of Austria / Europe we had the luck not to be intimidated by government or law enforcement to include backdoors or other ways to compromise the security and privacy we can provide to our customers. As our clear vision is to bring digital sovereignty to our customers, we try very hard to do everything possible to achieve this. Only the owner/user of a fragmentiX appliance knows how they configured the system – so not even we as the developers and producers of the appliances have any way to learn this secret configuration data. The sensitive configuration data includes usernames, passwords and the credentials (again usernames/passwords and URLs etc.) of the LOCATIONS – the places where the actual fragments are stored. Please ask us for more details on how we protect this sensitive information!
Posso usare fragmentiX per scambiare dati sensibili con i partner?
Is the data recoverable, if one of the LOCATIONS (or more) is down?
For every fragmentiX-setup there is a configured Storage strategy in place called frX-ratio. Our demo setup for example has a 2/3 frX-ratio configured. For a 2/3 frX-ratio two out of three LOCATIONS need to be accessible to recover the complete data record, but there are other strategies available. Get in touch with us for more information regarding frX-ratios.
What is the name of the protocol that is in place for the communication between the fragmentiX desktop client and the appliances?
The fragmentiX desktop client uses a protocol that is called simple storage service or S3 via HTTPS to connect to the appliances.
Which cloud storage providers are approved for fragmentiX products? Why do they need approval?
So far, we have given approval that the fragmentiX Storage Appliance products work with Amazon AWS, Wasabi, Alibaba, Linode, Backblaze, ITandTel and MinIO as promised. Additionally, there is support for MS Azure BLOB, NFS-storages and even USB storage devices.
We test each and every cloud storage provider for functionality as LOCATION before approving it to keep the quality of our products and services at a high level.