Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Secure storage in the cloud with new storage solution fragmentiX TM

November 2017 by Marc Jacob

The Austrian IT security company ProCom-Strasser introduces a new security product for cloud applications to the world market, enabling companies, operators of critical infrastructures and public authorities to securely store their data in cloud storage solutions. The special technological security concept was developed in close cooperation with cryptography experts at the AIT Austrian Institute of Technology. The product innovation will be presented from 21.-24. November 2017 at Milipol 2017 in Paris, the global leading event for Homeland Security. The AIT exhibition is part of an Austrian group exhibition, organized by Advantage Austria in cooperation with the Austrian Defence & Security Industry.

In contrast to classical encryption, which is turned into a fig leaf by the rapidly approaching completion of quantum computers, fragmentiXTM brings real information theoretical security to the user by splitting resp. fragmenting and storing these fragments separately from each other in different Simple Storage Solutions (S3). Even a future quantum computer can’t produce the original file from too few fragments alone. This approach, which has been known in theory for more than 50 years, has now become an easy-to-use product for companies and authorities through fragmentiXTM.

The concept: each of the up to 26 fragments does not contain any usable data. Through the deliberate selection and combination of storage locations for these fragments - public cloud storage, private cloud storage or own NAS storage - each fragmentiXTM user can determine for himself where the data fragments actually are stored. Only when a user-defined number of fragments is reassembled by the fragmentiXTM devices, the original data is available again. This so-called frX-ratio is the ratio of the fragments required for the restoration of the total number of generated fragments.

Risk of interception significantly reduced

At least two thirds of all fragments are required to restore the original file. It does not matter which 2 of the 3 fragment parts are available - which results in a significant reduction of the risk of data loss. Different fragmentiXTM devices can create up to 8, 16 or 26 fragments and transmit them to the storage locations over multiple WAN network connections. This makes monitoring via an ISP (Internet Service Provider) much more difficult. Without patronizing technical decisions of fragmentiXTM, each user can change and use the appropriate configuration for himself. The use of fragmentiXTM in a company network is conceivably simple due to its integration as a network drive in the LAN under WindowsTM or Linux-based systems.

See previous articles


See next articles