Con esta herramienta te facilitamos un acceso a todas las ofertas y demandas de tecnología europeas y a búsquedas de socios para participar en propuestas europeas de I+D publicadas en la red Enterprise Europe Network, pudiendo filtrar los resultados para facilitar las búsquedas más acordes con tus necesidades.

¿Quieres recibir estos listados de oportunidades de colaboración en tu correo de forma periódica y personalizada? Date de alta en nuestro Boletín

Para optimizar los resultados de la búsqueda, se recomienda utilizar términos en inglés.

Solución avanzada para almacenamiento seguro de datos en la nube pública

Resumen

Tipo:
Oferta Tecnológica
Referencia:
TOES20140520001
Publicado:
09/07/2015
Caducidad:
08/07/2016
Resumen:
Una pyme española ha desarrollado un hardware para almacenamiento seguro de archivos digitales en cualquier proveedor de almacenamiento de nube. Su uso reduce el riesgo de fuga o pérdida de datos confidenciales llevados a la nube. Los usuarios mantienen el control de su información y protegen la confidencialidad e integridad, con un acceso rápido y sencillo a toda la información que necesiten en cualquier momento. La tecnología se caracteriza por la máxima seguridad y uso transparente. Se buscan socios con el fin de establecer acuerdos comerciales con asistencia técnica.

Details

Tittle:
Secure advanced solution for data storage even in public cloud
Summary:
A Spanish SME has developed a hardware technology that definitively allows secure storage of digital files in any major cloud provider. Its use minimizes the risk of leakage or loss of confidential data taken to the cloud. Users always keep control of their information, protect their confidentiality and integrity, with quick and easy access to all the information they need at all times. Maximum safety and transparent use. A partner is sought for a commercial agreement with technical assistance.
Description:
A Spanish Company expert in Information Security, as well as in innovative products design and development to provide high digital security to the global market, has developed a hardware technology that definitively allows secure storage of digital files. This technology meets all the needs for a Safe Storage Service where users always keep control of their information.
The technology uses a very advanced and innovative software and cryptographic technology that definitely guarantees confidential data storage on privacy insecure and external repositories. It enables the safe use of the cloud, opening a new range of possibilities. This new technology provides real Security that is transparent for the end user and it applies stealthy very tight security policies automatically.

-Technical Description:
The technology is a single hardware module that connects to a Local Area Network using an Ethernet cable with an RJ45 connector and eventually a USB keyboard and mouse and HDMI/VGA monitor to access the Setup and Activation Console. Once the system is booted, the presence of such terminals is no longer required.
In operation, the identified modules are: (1) The reduced and bastioned operating system. (2) A SMB (Server Message Block) module to export part of the local file system to authorized users through the network. (3) The access control system to determine which users have an account on the system by a user/password pair, LDAP (Lightweight Directory Access Protocol) or Active Directory. (4) A unit responsible of the encryption/decryption of all files. (5) A service of upload / download encrypted files to / from the cloud. (5) A specific connector that will fit the different types of communication with the various clouds (Amazon, Azure, Google Drive, MEGA, etc.).

Features:
-Encrypts/Decrypts of files automatically.
-Assures Deduplicated files.
-Works with Cloud or External Repositories Storage (SMB, FTP, etc.).
-Integrated with Active Directory and LDAP.
-Includes deferred deletion and file version control.
-Applies robust symmetric cryptography with AES-256 (Advanced Encryption Standard), SHA (Secure Hash Algorithm) hashes, MACs (Message Authentication Code) and CRC(Cyclical Redundancy Checkings).
-Fixed to cryptographic keys with an effective length of 384 bits, and with authentication keys 256 bits long.
-There are different versions and configurations for different needs and scenarios.

Versions/Users:
The technology is a scalable solution and adaptable in different versions to meet different user's needs:
· Large Corporations or Government Offices: Ministries, Health, Education, Justice, Development, Defense, etc. Administration at all levels. Hospitals, Multinationals, Industrial Property. All agencies or companies that require different levels of file security.
· Medium and Large Businesses: Professionals, especially those that handle sensitive information: lawyers, doctors, dentists, architects, engineers, etc.

Advantages and Innovations:
The most important innovations of the technology are:

1. Files managed by the technology are always encrypted, regardless they are stored internally or in external repositories.
2. An original new operating procedure that allows automatic application of the file encryption policies of a company that stores its data in internal or external servers (clouds).
3. Full Independence from the client computers (universality) because it uses a protocol well known for exchanging digital files (SMB/CIFS) and it does not require installing client software or hardware on the user's computer.
4. Advanced and robust cryptographic keys management which ensures their effective length and their entropy, allowing decades of cryptographic protection to the files.
5. Advanced file identifiers management that grants full anonymity to the files stored in the cloud, making them indistinguishable from other device generated files. Files are only recognized by the device that can decrypt them.
6. Offers the effective cancelation/deletion of any digital file stored in clouds and external repositories. The particular device equipment that manages each file in the cloud has the exclusive control of the unique copy of the cryptographic keys required to decrypt it.
7. Versatility to use different communication protocols with external systems (REST, FTP, webDAV) as repositories and cloud storage (Amazon S3, Azure, Google Drive, MEGA, Dropbox, etc.)
8. The technology has a native and collective capability of Data Deduplication so that, as only one copy of each file is saved, storage and transported (to and from the cloud) and costs are minimized.
9. A convenient version control mechanism through a capacity for delayed file cancellation/deletion.

Stage of Development:
Available for demonstration
IPs:
Secret know-how

Partner sought

Type and Role of Partner Sought:
-Type of partner sought:
Companies which market innovative cutting edge solutions for the Security market. TELCO Operators that offer solutions for SMEs, large companies and Government, and Consulting Firms.

-Specific area of activity of the partner:
The company is looking for commercial agreements with technical assistance to introduce the product in the European market. Companies interested to work with an innovative technology that enables the Secure and Controllable Cloud Storage and provides a differential value in both performance and usability.

-Task to be performed:
To integrate and adapt this technology to specific local market needs, receiving the necessary technical support from the developer of the technology, and finally to market it.

Client

Type and Size of Client:
Industry SME <= 10
Already Engaged in Trans-National Cooperation:
No
Languages Spoken:
English
Spanish

Keywords

Technology Keywords:
01003009 Protección de datos, almacenamiento, criptografía, seguridad