Con esta herramienta te facilitamos un acceso a todas las ofertas y demandas de tecnología europeas y a búsquedas de socios para participar en propuestas europeas de I+D publicadas en la red Enterprise Europe Network, pudiendo filtrar los resultados para facilitar las búsquedas más acordes con tus necesidades.

¿Quieres recibir estos listados de oportunidades de colaboración en tu correo de forma periódica y personalizada? Date de alta en nuestro Boletín

Los términos de búsqueda han de ser en inglés.

Tecnología plug -Y- play para protección de datos locales y en la nube en empresas y pymes

Resumen

Tipo:
Oferta Tecnológica
Referencia:
TOES20170818001
Publicado:
18/09/2017
Caducidad:
18/09/2018
Resumen:
Una empresa española del sector de las TIC ha desarrollado una solución fácil de integrar que combina funciones de CSG (Cloud Security Gateway) y NAS (Network Attached Storage), con protección integrada de datos onsite y offsite. Esta solución ofrece una encriptación robusta, inmediata y automática, lo que permite disponer de copias de seguridad seguras y confidenciales en un proveedor de almacenamiento, incluso en nubes públicas. La solución es resistente al ransomware. La empresa busca socios con el fin de establecer acuerdos de licencia.

Details

Tittle:
Plug -Y- play technology for local and cloud data security in enterprises and SMEs
Summary:
A Spanish ICT company has developed an easy to integrate solution that combines CSG (Cloud Security Gateway) and NAS (Network Attached Storage) functions, with integrated on-site and off-site data protection. It provides immediate and automatic robust encryption, which allows having a secure and confidential backup in any storage provider -even in public clouds. The solution allows exclusive customer encryption key ownership and it is ransomware resistant. They seek for a license agreement.
Description:
The volume of digital data is growing (estimation of 40 Zeta bytes by 2020) and at the same time the data management security has become more complex due to the backup policy and the legal compliance (some companies are obliged by law to safety store their data for long periods of time, GDPR, sensitive data, industrial property, etc.)

Also, when using hardware devices for storage, information is exposed to robbery, attacks and other risks. Cloud storage ensures availability but there is a growing concern about the real security of this system due to the user lack of control.

Currently, security solutions in the market address either local storage security or cloud storage security meaning that a solution combining both systems would provide higher reliability.

In this context, the Spanish ICT company, has addressed this problem by the development of a small plug -Y- play hardware device that is connected to the user LAN (Local Area Network) and deeply encrypts cloud-bound data before the user leaves his home, office, etc. It also protects users from workplace loss, theft or damage since no files are stored locally.

The technology has different versions depending on the kind user. It is suitable for professionals, SMEs, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, etc.
It is especially useful for those companies that handle sensitive data and that are affected by the new GDPR (General Data Protection Regulation)

Key functionalities:
-Private -Y- Automatic Cloud Backup
The solution performs optimized cloud backup for the entire local network, everything that is stored in it gets automatically encrypted and backed up in off shore storage services. The solution does not require installation of desktop software, ensuring smooth deployment and operation.

-No local Risk. Ranmsonware resistant
It provides resistance against remote and local attacks, damage, loss, theft and ransomware.

-Exclusive customer encryption key ownership
The solution manages all the cryptographic keys needed to encrypt all your files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key.

-Compatible with local and cloud storage
The solution is a device that merges Network Attached Storage (NAS) functionalities with many different cloud storage services in a way that your data confidentiality and integrity is assured.

Main features:
-Connection to the LAN (Local Area Network) by Ethernet cable.
-De-duplicated files for optimized bandwidth and file storage.
-Private and locally shared folders for each user.
-Security does not depend on passwords or key phrases generated by users.
-Easy Setup: It does not require installation of desktop software being as simple as working with a network-attached storage (NAS) server.
-Robust Encryption: AES (Advanced Encryption Standard) 256-bit encryption is immediate, automatic and round the clock.
-Exclusive customer encryption key ownership: The solution manages all the cryptographic keys needed to encrypt all the files before they face any public, private or indoor storage service. Only the user can turn the device on with his startup key.
-Legal compliance: Meets stringent international data protection and privacy laws
-It can be integrated to any system or IT infrastructure (Windows, Mac OS, Linux, iOS, Android)
-Ransomware Immunity: It is resistant to any kind of ransomware.
-Business device dimension: 131x131x52 mm.

This technology is suitable for private users, big enterprises and holdings, public administration, commodities and critical infrastructures, hospitals and health services, SMEs, journalists and freelancers, etc.

The company is looking for international ICT partners willing to cooperate under a license agreement in order to market this technology.

Advantages and Innovations:
-Main innovation offered by this solution is that the data owner is the one that performs the encryption and the one who owns the encryption codes, so no external providers (for example cloud providers) have access to the information.

-Other data security solutions in the market address either local storage security or cloud storage security. On the contrary, this is the first solution in the market capable of removing all vulnerability from both cloud and local storage. It protects against local theft, leakage, loss or damage, since no unencrypted files are ever permanently stored locally.

-Provider Independence: Users have freedom to select the best combination of local or cloud providers for their business or personal information security needs.
Stage of Development:
Already on the market
IPs:
Secret Know-how

Partner sought

Type and Role of Partner Sought:
The company is looking for two kind of partners:
-ICT integrators with expertise in data security solutions willing to market this solution within their area of influence.
-Cloud providers willing to improve their cloud service data security by incorporating this technology to their portfolio.

The kind of partnership sought is license agreement.

Client

Type and Size of Client:
Industry SME 11-49
Already Engaged in Trans-National Cooperation:
Si
Languages Spoken:
English
Spanish

Keywords

Technology Keywords:
01003005 Computer Hardware
01003009 Data Protection, Storage, Cryptography, Security