Security without compromise: Our patented Content Storage Container (CSC) technique bundles the archive data with the corresponding meta data in special archive containers. These are secured against manipulation and unauthorized deletion. Retention times required by law are managed flexibly by iCAS. Files that have reached the retention date and are not on legal hold can be securely deleted according to Department of Defense (DoD) guidelines.
All access to the iTernity server is recorded, so that the complete history for every CSC container can be recalled.
Because iCAS accesses the standard file system, the application is completely independent from storage manufacturers and technologies. iCAS writes on NAS and SANs from any manufacturer. Even existing storage can be used for archiving. Since users can choose any kind of backup solution, existing processes and know-how can still be used. Hierarchical storage management (HSM) allows transferring data to tapes or other media.
iTernity’s approach is based on industry standards like CIFS, SHA512 and AES256 encryption, rather than proprietary technologies. The established Windows 2008, 2012 und 2012 R2 servers along with the .NET framework guarantee iCAS performance, stability and scalability in every environment. This offers the user peace of mind for the future. The iTernity archive solution can always be combined with any software and hardware components of third-party vendors. There are no dependencies on technological isolated solutions. There is also no effort for special training and integrations.
An additional bonus is the optional encryption of data with AES-256 algorithms to meet further security and privacy requirements (e.g. PCI-DSS). The archive data can also be compressed by up to 50%. This results in better memory usage, reduces energy consumption, and helps you to save costs.
iCAS has no limits in its scalability – the archive size as well as the performance can be adjusted according to the user’s needs. It is also possible to set up redundant and highly available configurations, using MS Cluster Windows Server 2012 and others.
Diverse applications such as DMS or ECM systems can access the iCAS software through a slim web service API and archive data on the configured storage system this way.
As an alternative to the web service API, iCAS offers a file system gateway (iFSG – iTernity File System Gateway).
iCAS has been certified by two independent entities, the financial auditor company KPMG as well as the renowned advocate for IT and media rights, Dr. Ivo Geis. Both have certified the legal conformity of iCAS for tamper-proof archiving of data, meeting all relevant statutory guidelines.
To download the KPMG software certificate please click here.
Additionally iTernity engaged Cohasset Associates Inc. for an independent assessment to evaluate the capabilities of iCAS to meet the storage related and audit history-related requirements of SEC Rule 17a-4 and CFTC Rule 1.31.
To download the Cohasset assessment please click here.
To meet all legal requirements for compliant archiving of business-related data, the complete archiving process in the organization needs an integrated design and must be well documented.
More flexibility thanks to virtualization – iCAS on virtual servers.