soda archiving october 2013 [email protected]

8
SODA Archiving October 2013 [email protected] www.redskiesgroup.com

Upload: helena-sims

Post on 12-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: SODA Archiving October 2013 info@redskiesgroup.com

SODA Archiving

• Secure data storage in the most secure, government trusted

data centres

• Data transmitted and stored in its encrypted form

• Industry leading data access control

• Encryption keys stored on premises, in a secure government

computing facility or at any site designated by customer

• Data only accessible to customer

• All the security features of SODA

• Very low cost storage

www.redskiesgroup.com 2

Page 3: SODA Archiving October 2013 info@redskiesgroup.com

SODA core strengths

•New privacy protocols developed in partnership with Microsoft•Data encryption throughout transmission & storageSecurity•Pipeline architecture to support almost limitless devices•Warm redundancy systems to ensure ongoing operationScalability•Open Data API to support any third party system•Support for domestic technology companies to extendExtensibility

www.redskiesgroup.com 3

Page 4: SODA Archiving October 2013 info@redskiesgroup.com

www.redskiesgroup.com 4

No need for dedicated IT

team

No need to run hardware on

premises

Free access to data

management consultancy

Low monthly fees

Savings

Page 5: SODA Archiving October 2013 info@redskiesgroup.com

www.redskiesgroup.com 5

ProcessStep 1 – Plan data storage requirement

sStep 2 – Deploy SODA

Step 3 – Ongoing use

•What data do you have•What should be stored in cloud

•Do you need a private cloud•Where should keys be stored

•We deploy SODA•We provide data access•We can help with integration

•Continue using your systems as before

•Enjoy low cost, trouble free data across your organisation

Page 6: SODA Archiving October 2013 info@redskiesgroup.com

www.redskiesgroup.com 6Encrypted onthe meter

Secure datatransmission

Encrypted datastorage

Triplicate certificate authority access

End to end data privacyNew data security protocols

developed with Microsoft,

protect data from the meter

through the full system to third

party smart software.

Industry leading data privacy

applied to all smart systems

automatically, improving all

smart systems for free.

Page 7: SODA Archiving October 2013 info@redskiesgroup.com

Extreme Levels of Security – SODA Secure• New state of the art security and privacy protocols developed in partnership with

Microsoft

• We support data signing and encryption with separate keys for each legacy

device or a single key for all legacy data

• Data is transmitted securely from end to end

• Data is stored still encrypted with the signature if available as proof

• Third parties requesting data can be authenticated against up to 3 unrelated

remote authorities held in 3 different secure locations. Common solution is one

authority held on customers premises or secure government storage facility

• Authorised requests are supplied with encrypted results to decrypt at client site

• Worlds most secure data centres that include ISO/IEC 27001:2005 Audit and

Certification & SSAE 16/ISAE 3402 Attestation Control 1 (SOC 1) Type 2 report

www.redskiesgroup.com 7

Page 8: SODA Archiving October 2013 info@redskiesgroup.com

Tamper proof smart meterKey pairs generated in meter

Readings encrypted as they·re generated

Cloud storage- Encrypted readings

- Signatures

Authority 1Microsoft Azure

Authority 2Amazon

Authority 3Rackspace

Third party Web APIAuthorise request

MeterHead end system

Secure request with credentialsReturned encrypted readings

Encrypted readingsSecurely transmitted

Computes a sumFor readings from 3 authorities

Triple certificate authority security model

www.redskiesgroup.com 8