Download presentation
Presentation is loading. Please wait.
1
SODA Archiving October 2013 info@redskiesgroup.com www.redskiesgroup.com
2
SODA Archiving Secure data storage in the most secure, government trusted data centres Data transmitted and stored in its encrypted form Industry leading data access control Encryption keys stored on premises, in a secure government computing facility or at any site designated by customer Data only accessible to customer All the security features of SODA Very low cost storage www.redskiesgroup.com2
3
SODA core strengths New privacy protocols developed in partnership with Microsoft Data encryption throughout transmission & storage Security Pipeline architecture to support almost limitless devices Warm redundancy systems to ensure ongoing operation Scalability Open Data API to support any third party system Support for domestic technology companies to extend Extensibility www.redskiesgroup.com3
4
No need for dedicated IT team No need to run hardware on premises Free access to data management consultancy Low monthly fees Savings www.redskiesgroup.com4
5
Process www.redskiesgroup.com5 Step 1 – Plan data storage requirements Step 2 – Deploy SODA Step 3 – Ongoing use What data do you have What should be stored in cloud Do you need a private cloud Where should keys be stored We deploy SODA We provide data access We can help with integration Continue using your systems as before Enjoy low cost, trouble free data across your organisation
6
End to end data privacy www.redskiesgroup.com6 New data security protocols developed with Microsoft, protect data from the meter through the full system to third party smart software. Industry leading data privacy applied to all smart systems automatically, improving all smart systems for free.
7
Extreme Levels of Security – SODA Secure New state of the art security and privacy protocols developed in partnership with Microsoft We support data signing and encryption with separate keys for each legacy device or a single key for all legacy data Data is transmitted securely from end to end Data is stored still encrypted with the signature if available as proof Third parties requesting data can be authenticated against up to 3 unrelated remote authorities held in 3 different secure locations. Common solution is one authority held on customers premises or secure government storage facility Authorised requests are supplied with encrypted results to decrypt at client site Worlds most secure data centres that include ISO/IEC 27001:2005 Audit and Certification & SSAE 16/ISAE 3402 Attestation Control 1 (SOC 1) Type 2 report www.redskiesgroup.com7
8
Triple certificate authority security model www.redskiesgroup.com8
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.