stealth software | SCS.Net
In order for companies to modernize their legacy IT infrastructure and reap the benefits of cloud computing and storage services they are replacing complex enterprise NAS systems with global cloud file systems, such as Panzura™, Nasuni™ or Ctera™. At the same time there is a need to greatly improve security of data stored and/or shared using cloud applications. Multi-cloud security platforms have been developed to address these requirements. Some examples are CipherCloud™ and Digital Guardian™.
Currently, data in transit to the cloud is protected by TLS 1.2 or 1.3. Only once it is stored in the cloud is the data protected by the most more robust AES256 encryption. The Rakoon attack has shown that there are vulnerabilities in using TLS.
SCS.Net is a new offering developed by Stealth Software to address issues around data protection of data in flight for high performance global file storage platforms for the cloud such as Panzura™, Nasuni™ or Ctera™ or multi-cloud security platforms such as CipherCloud™ or Digital Guardian™. Using .Net, SCS.Net is integrated with the cloud file and security platforms to provide patented AES256 encryption for data in flight and at rest. This means that all data will be encrypted before it is sent to the cloud to achieve the goal of our customers of maximum security at any level.
SCS.Net. provides additional benefits. The Stealth Replicator can be applied.
There are various use cases for Stealth Replicator:
- Adding a new storage device. This is usually the case, when an additional backup location is needed, or when a company wants to have another storage device in a different region for faster access.
- Changing an existing storage device. The Stealth Replication tool can also be used to switch from an unwanted storage device to another device. For example, when a customer wants to change vendor.
- Compared to the official command-line migration tool, the Stealth Data Replication has multiple benefits. Duration is shortened and performance of disc and CPU are substantially increased. Further details and comparison data are outlined in the Stealth Replicator data sheet.
Data can also be stored synchronous to multiple geographic locations, vendor or storage platform independent (e.g. AWS, Azure, IBM, Hitachi, Dell/EMC, Scality or any other cloud or on-premises storage platform). Data is protected in flight and at rest with AES256 encryption.