soda archiving october 2013 [email protected]
TRANSCRIPT
![Page 1: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/1.jpg)
SODA Archiving
October 2013
![Page 2: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/2.jpg)
SODA Archiving
• Secure data storage in the most secure, government trusted
data centres
• Data transmitted and stored in its encrypted form
• Industry leading data access control
• Encryption keys stored on premises, in a secure government
computing facility or at any site designated by customer
• Data only accessible to customer
• All the security features of SODA
• Very low cost storage
www.redskiesgroup.com 2
![Page 3: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/3.jpg)
SODA core strengths
•New privacy protocols developed in partnership with Microsoft•Data encryption throughout transmission & storageSecurity•Pipeline architecture to support almost limitless devices•Warm redundancy systems to ensure ongoing operationScalability•Open Data API to support any third party system•Support for domestic technology companies to extendExtensibility
www.redskiesgroup.com 3
![Page 4: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/4.jpg)
www.redskiesgroup.com 4
No need for dedicated IT
team
No need to run hardware on
premises
Free access to data
management consultancy
Low monthly fees
Savings
![Page 5: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/5.jpg)
www.redskiesgroup.com 5
ProcessStep 1 – Plan data storage requirement
sStep 2 – Deploy SODA
Step 3 – Ongoing use
•What data do you have•What should be stored in cloud
•Do you need a private cloud•Where should keys be stored
•We deploy SODA•We provide data access•We can help with integration
•Continue using your systems as before
•Enjoy low cost, trouble free data across your organisation
![Page 6: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/6.jpg)
www.redskiesgroup.com 6Encrypted onthe meter
Secure datatransmission
Encrypted datastorage
Triplicate certificate authority access
End to end data privacyNew data security protocols
developed with Microsoft,
protect data from the meter
through the full system to third
party smart software.
Industry leading data privacy
applied to all smart systems
automatically, improving all
smart systems for free.
![Page 7: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/7.jpg)
Extreme Levels of Security – SODA Secure• New state of the art security and privacy protocols developed in partnership with
Microsoft
• We support data signing and encryption with separate keys for each legacy
device or a single key for all legacy data
• Data is transmitted securely from end to end
• Data is stored still encrypted with the signature if available as proof
• Third parties requesting data can be authenticated against up to 3 unrelated
remote authorities held in 3 different secure locations. Common solution is one
authority held on customers premises or secure government storage facility
• Authorised requests are supplied with encrypted results to decrypt at client site
• Worlds most secure data centres that include ISO/IEC 27001:2005 Audit and
Certification & SSAE 16/ISAE 3402 Attestation Control 1 (SOC 1) Type 2 report
www.redskiesgroup.com 7
![Page 8: SODA Archiving October 2013 info@redskiesgroup.com](https://reader036.vdocuments.us/reader036/viewer/2022082518/56649e695503460f94b66dd0/html5/thumbnails/8.jpg)
Tamper proof smart meterKey pairs generated in meter
Readings encrypted as they·re generated
Cloud storage- Encrypted readings
- Signatures
Authority 1Microsoft Azure
Authority 2Amazon
Authority 3Rackspace
Third party Web APIAuthorise request
MeterHead end system
Secure request with credentialsReturned encrypted readings
Encrypted readingsSecurely transmitted
Computes a sumFor readings from 3 authorities
Triple certificate authority security model
www.redskiesgroup.com 8