Microshard™ Technology eliminates data sensitivity, providing security, privacy, and compliance beyond encryption.
Here's how it works:
How it works
The ShardSecure™ Virtual Appliance can be deployed in the cloud or on-premises to ensure data security and privacy. The appliance ingests unstructured data via the RESTful API, NFS, and SMB.
Data is compressed then shredded into microshards. Microshard™ data is thoroughly mixed, poison data is added, and new shards (containers holding many microshards) equal to the number of configured storage destinations are formed.
Data is distributed following a user-set policy to multiple independent locations, which may include on-premises/datacenter or cloud storage. The appliance will reassemble microshard data whenever needed for authorized users.
Structured and unstructured data
Single-digit byte shard sizes
Shard before or after encrypting without disruption.
Move Microshard data easily between locations with one click.
Zero trust data security
Separate data from admins, employees, and cloud providers, eliminate human error and insider threat risks.
Reduce attack surface
Distributed, Microshard™ data drastically reduces available attack surface.
2-10x cloud performance gains
Streaming Microshard data can yield read, write, transfer performance improvements.
The ShardSecure™ Engine is currently integrated with the top five cloud service providers including AWS, Azure, Google, IBM and Oracle Cloud Infrastructure, in addition to Box and Dropbox.
Our flexible core engine can be rapidly integrated with other cloud service providers upon customer request.