1 Back up, restore and share file in the cloud with Proven Military-grade Security Secure Cloud Storage for Small and Medium Enterprises LockCube Whitepaper
2 Data Security in the Cloud Cloud storage is a ma er of choice and trust to enterprises. Data breach is a ma er of redefining data protec on. 3P encryp on will be the key to redefine data protec on and reinstate a culture of choice and trust in the cloud. The challenges of data backup faced by enterprises More and more enterprises are grappling with one common problem where and how to store their cri cal data securely? Some enterprises may store their cri cal data in their computer hard disk or file server or back up to a removable media. But accidents like crashed hard disk, lost USB flash drive or damaged external hard disk do happen. Disasters like flood, fire or earthquake do strike and will destroy all cri cal data alongside with the storage devices in no me. There is no way you can recover these cri cal data stored in the ruined devices. Furthermore, loss of important data may affect a company s business con nuity and progress. In a worst scenario, it may even cause the company to shut down. What about those mobile business professionals who need to access sensi ve data on the go? It is extremely cumbersome for them to carry portable storage devices (like USB flash drive and external hard disk) wherever they go. What if they lose the devices? It means that the unprotected sensi ve data in the lost devices may run the danger of being accessed by someone else. Since they are always on the move, they need the convenience of accessing the data any me, anywhere with their laptop, smart phone and tablet. How to solve their problems? Cloud Storage Solu on Cloud storage is a more efficient and cost effec ve backup solu on for small and medium enterprises, as compared to se ng up a file server in the company or hosted in a remote data center. They can store tons and tons of data in the cloud without having to purchase expensive storage equipments. They can cut down on IT expenses and reduce unnecessary overheads by embracing pay-per-use Infrastructure-as-a-Service (IaaS) or So ware-as-a-service (Saas) solu ons. They can also enjoy great scalability and cost savings by scaling their cloud storage according to their requirements and pay only for what they use. Since data is stored in the cloud, enterprises no longer have to worry about unrecoverable data due to crashed hard disks or misplaced USB flash drives or natural disasters. With an Internet connec on, they can access the data any me, anywhere with their laptop, smart phone and tablet. Cloud storage definitely offers numerous benefits to enterprises, but they are s ll hesitant to use it. Why? Data Security in the Cloud - A Top Concern for Enterprises Numerous industry surveys have cited data security as users key concern when pu ng their data in the cloud. Recent news report on hacking ac vi es targeted at big corpora on, government sites and social media increase
3 Security Anti-APT Infrastructure Solutions enterprises concern over data security in the cloud. Their worries over data integrity, privacy and reliability have deterred them from exploi ng the true advantages of cloud storage solu on. Since anyone can access the data stored in the cloud any me and anywhere, there is a possibility that their privacy may be compromised. They are worried that sensi ve data in transit may be compromised by poten al intruders or stolen by their adversaries. Most enterprises are used to storing their informa on in their own premises. They may feel uneasy to entrust their cri cal data to another company for storage. They are concerned that a disgruntled employee of the cloud service provider may poten ally commit an insider a ack. In fact, such data security concerns are not unfounded especially with a data breach incident by a renowned cloud storage provider in June It accidentally allowed anyone to access any user s account without user s knowledge. Massive data breaches are beyond any user s control. They will ul mately make or break an enterprise s choice in u lizing a cloud storage solu on. But we shouldn t resign to this fact. There is a way to store your data securely in the cloud without worrying about security breaches. But you must do it right. What does a good security infrastructure entail? Data security can be a great stumbling block to users easy access to the cloud data any me, anywhere. To make security process less painful, most of the cloud storage providers usually allow the encryp on and decryp on process to be done at the server. In order to perform this encryp on and decryp on process at the server, a single server encryp on key stored at the server is used for encryp ng the storage system. Unfortunately, anyone with access to the server system can then easily access user s data wantonly. Hence, a good and robust data security should cover up such vulnerability by removing all possibili es of exposing the user s key to unauthorized personnel. Every single user has to create, own and safe-keep his/her own unique key that authen cates his/her iden ty. Data encryp on and decryp on process should be performed only at the client side and with a user s encryp on and decryp on key. Unauthorized intruders to the cloud storage server are unable to access the encrypted data without the proper decryp on key. But such sophis cated security infrastructure encompasses extremely complicated technical architecture which requires many years of intensive development and tes ng effort. SecureAge Technology started off by developing security solu ons specifically for the militaries and governments based on stringent security policies. Our cumula ve years of experience have helped us to develop a robust security infrastructure which has been widely deployed by the militaries and governments in the Asia Pacific region. LockCube, developed based on the same security implementa on, is the reliable cloud storage service that genuinely keeps your confiden al data safe in the cloud. LockCube reinvents data security in the cloud. It armours every single data with an invisible cloak of encryp on transparent and automa c to users yet unfathomable to hackers, sniffers and insiders.
4 What is LockCube? What is LockCube? LockCube provides business users a smart and secure way to backup, restore and share any file in the cloud, any me, anywhere, on any device like desktop, laptop, smart phone and tablet. It is the perfect cloud storage service for small and medium enterprises because: i. It is highly affordable as users need to pay only for the storage they use with unlimited access, ii. It fulfills a company s business con nuity and disaster recovery plan by providing a secure and regular offsite backup. iii. It provides company with a cost-effec ve backup alterna ve to costly hardware, servers and databases. iv. It provides company with a simple, reliable and secure way of storing their voluminous data, instead of relying on storage media (like backup tape, external hard disk and USB flash drive) with limited life span. v. It provides company with unlimited scalability of storage space without needing to plan ahead vi. It allows secure business collabora on whereby confiden al informa on can be shared among co-workers, counterparts or customers. vii. It helps company with limited IT resources by cu ng down on the IT support in server maintenance. viii. It provides mobile business professionals an easy and unlimited access to the data any me and anywhere. ix. It provides mul ple access methods via web, direct disk moun ng and dedicated LockCube App. LockCube s Infrastructure with Proven Military-grade Security 1) User s Encryp on Key LockCube is built on a security infrastructure that is proven to be military-grade due to its successful deployment for more than 20,000 militaries and governments in the Asia Pacific region. It eliminates data security concerns by using a comprehensive authen ca on and encryp on technique to ensure that only authorized user is privy to the content of the data. Each and every authorized user creates and safe-keeps his/her own unique encryp on key that is not shared with anyone else. Unlike other cloud storage operators, the user s encryp- on key is not stored at the LockCube server, as stated in LockCube Terms of Service. There is no way anyone, including the LockCube operator, can access the user s data without the key. On the other hand, many other cloud storage providers, using a single server encryp on key, may claim to impose stringent policy to restrain their internal staff from accessing the users data. But human is the weakest link in data security. Any of their disgruntled employees can simply ignore this policy and choose to sabotage the users data. Since only authorized users safe-keep their own encryp- on key, there is no way any insider, sniffer and hacker can compromise the security of the user s data stored at the LockCube cloud storage. Even when a government subpoena orders the surrender of the user s data, it will only expose files with unreadable content. 2) Two Layers of Security Like all the other cloud storage operators, LockCube secures the network transmission between the user machine and LockCube server with SSL/TLS (Secure Socket Layer/Transport Layer Security) technology. But the difference is LockCube uses SecureAge s proprietary SSL VPN solu on to protect the network transmission.
5 How Does LockCube Work? User logs into LockCube via any devices Smartphone File backup Encryp on Key Files get automa cally encrypted before leaving the user s device Back up files from client machine to LockCube Server Desktop Laptop Restores files from LockCube Server to client machine Tablet File restore SSL/TLS SSL/TLS Decryp on Key Shares file with User A and User B Internet Files get automa cally decrypted when downloaded File sharing SSL/TLS User A access shared encrypted file User B access shared encrypted file Decryp on Key Decryp on Key Shared file gets automa cally decrypted when User A and User B access it SecureAge SSL VPN secures all remote access to the network by using SSL as the underlying security protocol to prevent access by unauthorized users. SSL enables secure HTTPS sessions by securing data above the transport layer without interfering with the lower layer network services. But SSL only protects the network transmission and the data in mo on is s ll vulnerable to poten al sniffers using man-in-the-middle a acks. Hence, LockCube for fies the security by providing another layer of protec on - data encryp on based on SecureAge s proprietary 3P (Proac ve, Persistent and Pervasive) technology. With 3P technology, files get automa cally encrypted at the client machine, remain con nuously encrypted before, during and a er they travel over the Internet and even when residing at the LockCube server. In short, 3P technology provides end-to-end data protec on that forbids any unauthorized intermediary party from accessing the data. LockCube s two layers of security give users a complete peace of mind knowing that it will be a more secured storage op on than their own local network storage as it fully protects user s data against malicious a acks.
6 LockCube Infrastructure 3) Encryp on at File-level Secures Data in Mo on and at Rest LockCube leverages on AES (Advanced Encryp on Standard) to encrypt each file with 256-bit unique session key. 256-bit AES is the strongest encryp on standard in the world today against brute-force a ack. It is cer fied to be used for protec ng secret level data by the US government and Department of Defense. As cited in Wikipedia s Brute-force a ack, Breaking a symmetric 256-bit key by brute force requires mes more computa onal power than a 128-bit key. A device that could check a billion billion (10 18 ) AES keys per second would in theory require about 3x10 51 years to exhaust the 256-bit key space. Unlike other cloud storage operators, LockCube provides file-level encryp on that encrypts individual file with the user s encryp on key at the client machine. These files, when accessed, will be decrypted automa cally via the authorized user s corresponding decryp- on key. Since individual file remains persistently encrypted before, during and a er travelling over the Internet, there is no way any hacker, sniffer and insider can access the encrypted files without the user s decryp on key. Many other cloud storage operators also claim that they provide data encryp on to secure user s data. Before jumping straight into their service, it is advisable to always step back and truly study their security architecture. In fact, most of them encrypt the data only at the server via full disk encryp on. Full disk encryp on uses the same encryp on key to encrypt the en re disk or server but not the individual file. Once the system has started up, it can read every single file as plain data. Hence, full disk encryp on is like a bank vault with the door wide open, and once the users data travel out of this bank vault, it will be unprotected and vulnerable to intruder a acks. It is an adequate protec on for laptop and portable storage device when they are lost. But it is definitely not a foolproof data protec on in the cloud since any of the cloud storage operator s employees and hackers can easily access the user s data. 3) On-the-fly Encryp on - Automa c and Transparent LockCube enables automa c data encryp on and decryp on without a user s conscious effort to manually encrypt and decrypt every single file. The data encryp on and decryp on process is so transparent that the users are not even aware of it. It is as if each and every data is armoured with an invisible cloak of encryp on that does not disrupt a user s rou ne access to the data in LockCube cloud storage. Acknowledging that human is the weakest link in data security, sophis cated security technologies are incorporated into LockCube to provide users a secure but convenient mean of accessing the data without requiring their conscious involvement in protec ng their data. 5) Mobile Device Data Encryp on LockCube provides LockCube App for mobile device to allow users to securely store and access any files in the cloud with any mobile device like Android smartphone, Android tablet, iphone and ipad. It leverages on 256-bit AES encryp on and TLS (Transport Layer Security) technology to securely upload and download any files (such as Microso Office documents, PDFs, Contacts, videos, photos and songs) any me and anywhere. During any upload, the data are automa cally encrypted before leaving the mobile device and remain con nuously encrypted as they transmit over the Internet right up to the LockCube server. Likewise, when the data is downloaded from the LockCube server to the mobile device, the data remain encrypted on the smartphone or tablet repositories. The data will be decrypted only when user access them via LockCube App for mobile device. This is known as end-to-end security technology that ensures only authorized users with the right encryp on key are privy to the content of the data. Any intruder or trespasser will not have an avenue to sniff for valuable
7 Key Features data around the public network, from the cloud storage or from the mobile device. Therefore, users no longer have to worry about other people accessing their sensi- ve data when they lost their mobile device. 6) Flexible Customiza on SecureAge Technology has accumulated years of experience in customizing addi onal security capabili- es for large enterprises, par cularly for the government. We can custom-built addi onal security features into LockCube in order to meet your corporate policies and security requirements. We provide the op on of incorpora ng two-factor authen ca on into LockCube. So apart from the usual login and encryp on authen ca on, companies can also provide a second layer of authen ca on via either mobile phones or smart card or USB token. Key Features To start using LockCube, users need to download a LockCube App via Java applet. LockCube App offers many useful func ons like backup, restore, share and LockCube account and session management. 1) A Total Backup Solu on with In-file Delta Technology that creates versioning of backup folders by specific date and me. It allows users to salvage the original file even when the current version is corrupted or accidentally deleted. It also saves the user s storage space since the unmodified files are not replicated. LockCube comes with a powerful backup func onality that prevents data loss and helps enterprises to fulfil their disaster recovery and business con nuity plan. It supports both manual and scheduler op ons. Scheduler gives users the flexibility of defining a recurring backup date and me that will not disrupt their work rou nes. LockCube enables a highly efficient incremental backup of voluminous files by using in-file delta technology. During the backup process, the in-file delta technology will check and compare the en re backup files with those stored in the cloud storage. It will then iden fy and automa cally backup only those modified data within a file but not the en re file. Hence, it reduces subsequent backup me and network bandwidth usage significantly. Users, who have access to high speed fibre network will get the most benefits out of this smart technology. They can enjoy daily backup of huge data size of up to 500 GB (Gigabytes) at a very high speed. LockCube also caters for data backup with unlimited versioning using in-file delta technology. The smart versioning feature supports me-stamping capability
8 Key Features 2) LockCube as a Network Access Storage (NAS) LockCube a aches the cloud storage to the user s machine as a network drive known as LockCube drive (usually Z:\). It works like a normal NAS drive that provides users with a direct access mechanism to their data in LockCube cloud storage. Users can view their files using file explorer, drag and drop their files for copying, using any applica on to access their files directly, and even execute program stored on LockCube cloud storage. In short, it gives users the convenience to store, open, edit, save, copy and paste any file just like a computer local drive. Since edi ng and saving of the files are done directly on the LockCube drive, traces of temporary files will only be created on this LockCube drive and not on the computer local drive. Hence, users do not have to worry about leaving trails of sensi ve data in their computer. 3) Secure File Sharing LockCube is built with a sophis cated PKI based technology that is transparent to the end users. It uses RSA public key cryptography to enable a user to securely share file with his/her designated recipient(s). A file, when shared, is encrypted specifically for the chosen recipient(s). Only the authorized recipient(s) can decrypt the shared file with their corresponding decryp on key. 4) Restores any File Securely LockCube allows users to restore their files securely from the LockCube cloud storage to their client machine. This is an extremely useful feature for users to recover all their cri cal data when their computer hard disks crash, when their handheld devices are lost, or when disasters strike. During the restora on process, files get automa cally decrypted via the user s corresponding decryp on key on their local machine. The en re decryp on process is seamless and invisible to the users.
9 Technical Features 5) SecureDrive An encryp on U lity LockCube is the world s first cloud storage service to provide an encryp on u lity, SecureDrive. SecureDrive is a value-added op on for users to either rapidly backup voluminous data or promptly restore cri cal data during disaster recovery via a removable media (eg USB flash drive and external hard disk), with the help of the LockCube Team. It uses 256-bit AES to automa cally encrypt/decrypt files with user s encryp on/decryp on key. Hence, users will have peace of mind knowing that the LockCube Team, when performing file backup or restore, is unable to view the encrypted files without the user s decryp on key. SecureDrive also allows users to salvage their cri cal data. The LockCube Team helps users to restore all encrypted files from LockCube cloud storage to user s removable media. The user will, in turn, use Secure- Drive to copy and decrypt the encrypted files from the removable media back to their local hard drive or file server. Users can enjoy a hassle-free backup of more than 50GB of data by using SecureDrive to copy and encrypt all files from the local hard drive, file server, or even the LockCube drive to any removable media. The LockCube Team will then help users to copy the encrypted files from the removable media directly to LockCube cloud storage. Technical Features Military grade security implementa on 256-bit AES data encryp on Unique session key for each encrypted files Full RSA public key encryp on support Master encryp on key is owned by the user and not accessible by the server SSL VPN tunnel between user machine and LockCube server for double layer security protec on A total backup solu on that provides secure remote data backup support Unlimited versioning of backup data with file level deduplica on support Secure disk moun ng of LockCube Storage as network a ached storage (NAS) Mobile support for ios and Android devices Easy access to user s cloud data using web, mobile device, restore tool and direct disk access Op onal direct access service to LockCube storage server for quick backup and restore opera ons Op onal 2FA authen ca on support Need More Information? General Enquiry: Public Relations / Marketing: LockCube Technical Support: Asia Pacific SecureAge Technology Pte Ltd 3, Fusionopolis Way #05-21, Symbiosis Singapore Japan SecureAge K.K. Barbizon 18, 7F Shirokanedai Minato-ku, Tokyo Japan North America SecureAge Technology Inc 3 Twin Dolphin Drive Suite 150 Redwood City CA U.S.A. Copyright 2012 SecureAge Technology Pte Ltd. All rights reserved.
The Ultimate Data Protection for Cloud Data Security in the Cloud SecureData Whitepaper Cloud Data Security Why is Data Security in the Cloud Necessary? Many surveys have cited data security as organiza
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
Technical report, IDE1108, March 2011 Mobile One Time Passwords and RC4 Encryption for Cloud Computing Master s Thesis in Computer Network Engineering Markus Johnsson & A.S.M Faruque Azam School of Information
G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected
White Paper: Unlocking Encryption A New Key to Data Security Table of Contents Page Executive Summary 1 Overview: Encryption Defined 2 The Business Need For Encryption 3 A Banking Case Study 3 Real-World
Training Guide Contents Introduction... 6 Backup and Disaster Recovery Market Drivers Today... 6 What Does This Mean for Customers?... 7 Acronis Word Search... 8 Training Agenda... 9 Training Objectives...
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
V 1.0 November, 2010 CYBERSECURITY The protection of data and systems in networks that connect to the Internet 10 Best Practices For The Small Healthcare Environment Your Regional Extension Center Contact
Preparing for Disaster: Backup Scenarios That Work Executive Summary by Tom Mills simplitek Corporation - Technology Consultant to Small Business With some simple and inexpensive steps, any small business
White Paper Avoid the Top 5 Epic Fails of Enterprise Endpoint Backup Costly Mistakes Expose Corporate Data to Unnecessary Risk Executive Summary Traditional backup protected information stored on servers
Datto Whitepaper 7 Essential Benefits of Hybrid Cloud Backup Datto is a leading provider of backup, disaster recovery (BDR), and business continuity solutions targeted to the small to medium business (SMB)
VirtuousIT Ltd 1 Table of Contents 1 Introduction 3 The Data Explosion 3 The Importance of Rapid System Recovery 3 2 The VirtuousIT Solution 4 3 RecoveryShield - Solutions 5 Large Business 5 Small Medium
A Secure Data Transfer Technique for Cloud Computing Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Computer Science and Engineering Submitted
Acronis Backup & Recovery 11 Next Generation Physical, Virtual, Cloud Backup, Disaster Recovery, and Data Protection Solution from Acronis An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Table
Moving from Legacy Systems to Cloud Computing A Tata Communications White Paper October, 2010 White Paper 2010 Tata Communications Table of Contents 1 Executive Summary... 4 2 Introduction... 5 2.1 Definition
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
Best Practices in Identity Management Introduction There are many definitions, both academic and scientific, for 'information security'. Some are technical, some are even philosophical - most are difficult