Dispersive Storage Platform Delivers Enhanced Data Protection Capabilities with New Authentication Feature
ALPHARETTA, GA: Dispersive Technologies, the provider of software defined solutions which virtualize routing and data storage for IP-based networks adds new authentication feature which supplements another layer of defense for its Dispersive Storage software platform to bestow enhanced data protection.
Dispersive Storage tool contains a client which is an edge device to save data, a Network Storage Device and a Shuffling Server. It is a software tool which divides data into small blocks as small as 1kband spread these blocks across multiple storage devices to prevent data theft, malware insertion and blocks unauthorized manipulation of stored data. The data can be reassembled when needed.
Dispersive Storage data paired with Dispersive Virtualized Networks delivers stored data with optimum speed, security and reliability.
Dispersive Virtualized Networks (VNs)- the virtualized routing platforms can be used instead of private networks to deliver data with greater speed, tighter security and more reliability and it uses single or combination of physical connections to the internet in which path selection is continuously changing and message encryption varies from path to path. These independent paths are based on the factors like Bandwidth availability, Line quality and measured time delay on each independent packet stream.
The locations of the stored data are periodically shuffled; Dispersive Storage which is supposed to be available by later this year poses ability to curtail random bytes from storage points and leverage them to form a dynamic key that changes with each shuffling. "This feature introduces a novel approach to combat the ever present and increasingly aggressive and sophisticated cyber threat," says Robert W. Twitchell, Jr, President and CEO, Dispersive Technologies.
“Our software works with all existing infrastructure, runs on commodity hardware, and enables the use of lower-cost bandwidth, these improvements in security and performance are typically achieved at a lower total cost," says Twitchell.
By Dr. John Bates, CTO, Intelligent Business Operations &...
By Denise Zabawski, CIO, Nationwide Childrens Hospital
By Cynthia Weaver, A.V.P of IT, Walbridge
By Kris Lappala, CIO, Kiewit
By Sherry Aaholm, VP & CIO, Cummins [NYSE:CMI]
By Leo Casusol, CIO, Liquidity Services
By Joe Fuller, VP/CIO, Dominion Enterprises
By Dennis Fiszer, CCO, HUB International
By David Butler, Sr. Director, Digital Customer Experience,...
By Mark Jacobsohn, SVP, Booz Allen Hamilton
By Miguel Gamino, CIO & Executive Director-Department of...
By Jonathan Reichental, CIO, City of Palo Alto
By Pam Puetz, VP & HR Services, First American Financial...
By Aref Matin, CTO, Ascend Learning
By Jim Sills, CIO/Cabinet Secretary, State of Delaware
By Jesse Laver, Vice President Global Sector Development,...
By Andy Newsom, CIO, CSL Behring
By Jason Cook, CISO, BT Americas [NYSE:BT]
By Jim Grubb, VP Marketing & Chief Demonstration Officer, Cisco
By Don Lindsey, VP and CIO, Tallahassee Memorial HealthCare