Assureon Datasheet
Assureon Datasheet
Assureon Datasheet
ASSUREON SOFTWARE
Assureon Software gives you the flexibility of selecting a deployment option that best
fits your organization’s infrastructure strategy. Assureon software can be
implemented in a public cloud or on-premise. The software can be deployed on any
standard or virtualized server.
UNBREAKABLE BACKUP
As malware is now also targeting backups, Assureon, in conjunction with UnityTM,
provides the last line of defense to protect backups from any malware, ransomware
attacks, or user error so organizations can recover backups from a worst-case
scenario.
Failover/Failback Native active/active replication protects against site disasters with automatic read failover and manual write failover.
Optional RoCE (RDMA over Converged Ethernet) connectivity delivers blazing-fast 40GbE read functionality
Performance
for virtual shortcuts.
Protect and secure digital assets with the immutable data structure utilizing cryptography to secure transactions.
Private Blockchain
Automated integrity audits and redundant sites maintain data integrity and transparency.
Assureon complies with governmental regulatory requirements including HIPAA, GDPR, CCPA, GLBA,
Regulatory Compliant
Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), CJIS, SEC 17A-4 and PCI-DSS.
Geographic Separation Two active Assureon systems can continuously replicate to each other to protect against site (cloud) outage.
Scale capacity up to multiple petabytes and add performance by using multiple Assureon archive storage
Scalable Capacity
systems together. All nodes across sites are managed through a seamless management interface.
Transparently offload inactive unstructured data from Tier-1 or cloud storage for a more cost effective
Storage Optimization
solution that’s easily retrieved. Disk Space Monitoring will manage storage space at the destination.
Assureon protects from ransomware attacks and can be implemented in various configurations including
Unbreakable Backup
tiered, replicated and high availability.
DATA INTEGRITY
Self-healing integrity checks and file availability audits along with digitally signed metadata files and third-
Chain of Custody party secure time stamps work together for the utmost protection of files within Assureon. Together, this
applies a verifiable chain of custody to each data set throughout the retention period.
Files are continually verified against their fingerprints, repaired using their copies and safeguarded by RAID
Data Verifi ation
4
disk arrays for days or decades.
Each time a file is saved, a unique fingerprint is generated using both an MD5 and SHA1 hash of its contents
Fingerprints
and metadata, so history and contents cannot be altered after the fact (WORM storage).
Secure Time Tampering with the system time clock is prevented by using a global, redundant, secure time source.
File Audit Each file is assigned a serial number which is used to ensure no files are missing or inappropriately added.
Each file and its fingerprint is stored twice in the Assureon. The second copy is either stored in a separate
Two Copies
RAID disk set in the same Assureon or on a remote Assureon.
ASSUREON SOFTWARE
DATASHEET 2 NEXSAN.COM