Technologies

Technologies used in fragmentiX products

APPLIANCES

Coming from the digital forensics business our founder and the other leading technicians understood very soon that the desired security level of the fragmentiX solutions is only achievable in a very strictly controlled environment. This starts with the supply chain of all components and ends with the protection of the access credential needed to communicate with various cloud storage providers. It would be easy to implement fragmentiX as a “software only” but it would not fulfill the required high level protection for sensitive data.

SECRET SHARING

Secret Sharing was first published by Israeli cryptography expert Adi Shamir. Secret Sharing allows files and directories to be split up – fragmented – to a admin defined number of storage LOCATIONS – only known to the appliances owner. This minimizes the risk to loose this data to hackers, thieves and spies.

Any questions?

en_USEN