DATA STORAGE SOLUTIONS

DATA STORAGE SOLUTIONS

AVET CLOUD & NETWORK DATA SECURITY

Our unique data security approach further enhances the evidential integrity of AVET hardware by proving a complete data authenticity and protection infrastructure that collectively and completely safeguards valuable information from external tampering or attacks.


New patented technology for the first time shows how the two problems of data security and data sovereignty can be successfully managed, while opening up the cost advantages of public cloud.

THE GAME CHANGER

AVET present patented solutions that divides data recorded on AVET Recorders into segments, or shards, which can be stored freely in an organisation’s IT infrastructure, whether Public Cloud, Private Cloud, On-Premise or a combination of them all. Individual shards are completely anonymous, so no usable information can be extracted from them. Yet as long as one shard is stored in the required ‘home’ jurisdiction, the whole dataset meets data sovereignty requirements.


ULTIMATE PROTECTION

Data anonymization and sharding is seamless for users. The complete AVET eco-system passes recording data seamlessly into the protected environment ensuring the privacy and sovereignty of data. This novel approach to data privacy and protection provides an extra layer of defense, complementary to incumbent security systems. This at a time when data breaches are increasing with data regulations becoming more territorial and stringent.


A critical aspect of the security of this solution is that a perpetrator is required to possess every data shard to have any possibility of breaking the privacy security and revealing information. The solution may be configured to output any number of data shards, but with a default setting of x 4 data shards.


The act of saving a file recorded on an AVET recorder externally automatically leads to the anonymisation and sharding, rendering the data completely secure. Later recovery of the file retrieves the data and reorganises it into the original structure which can be cross referenced against the data security processes employed within the AVET recording devices. Yet the information contained in the different shards is inaccessible to any unauthorised person.


In March 2019, the UK Ministry of Defence challenged their own data experts to extract any information whatsoever from any shard. They did not succeed. The individual shards have no meaning until consolidated, and only the data owner can do this. No encryption is necessary, although this can be applied if wished, so brute force attacks, even using notional quantum computing, do not and cannot work. We believe this is currently the most secure data storage method in existence. It is secure, because data cannot be unlocked by any third party (criminal, competitor, government body- anyone) and compliant, because the whole body of data meets sovereignty and location regulations.


THE BUSINESS CASE

Although presented as a solution focused on the secure storage of evidential interviews, this data storage solution provides major advantages when used in isolation. Providing military grade data security whilst combined with the convenience, accessibility and scalalability provided by the cloud, this advanced and extensible solution goes one step further by providing substantial financial and energy usage savings. 


We estimate in most comparable scenarios the cost of ownership reductions will be significant. The UK Ministry of Defence stated “We estimate x10 cost-savings migrating data stored from our on-premise data centres to data being stored in the public cloud“ . 

Additionally, cloud computing can significantly reduce energy consumption, waste, and greenhouse gas (GHG) emissions. According to Microsoft Corporation and WSP Global Inc., cloud computing is 93% more energy-efficient and has 98% lower GHG emissions than on-premises data centres.


“ The Data Shards are Unreadable

Mathematical proof was carried out which confirmed that even if multiple locations and N-1 shards were to be compromised, the perpetrators will not be able to recreate the original information.”

“Provides ‘Perfect Secrecy’ Against Threat Actor

“Perfect Secrecy” means immune to brute-force attacks including against quantum computers, therefore future-proofing data security.”


UK University Professor of Computer Science and Cybersecurity Chair 

AVET Data Storage Solutions

Related Products

Share by: