Share +

STASH Hibernate   

Developers Security

STASH Hibernate™ is architected for decades-long data resilience & viability. True data archive.

STASH Hibernate™ is architected for long-term resilience. We know that storing data for a few years (backup) and storing data for decades at least (archival) are totally different goals, and require different tools and strategies. STASH’s approach to resiliency draws from the lessons of biological systems. We promote diversity in instances, data slicing, hosting options, geography, and formats. Put the data away for a long time and retrieve it with integrity and usability when you need to. Regulators like the FDA will appreciate the file fixity steps we take to register who has accessed or changed the data. The STASH approach is consistent with both: •European Framework for Audit and Certification of Digital Repositories •ISO 16363: a system for the "audit and certification of trustworthy digital repositories"

STASH Hibernate™ is well designed to meet the growing regulatory requirements for long-term viable data storage required by such regulations as Sarbanes-Oxley.

This is a product well designed for the Life Sciences, Government and Financial service industries, to name a few, where regulations and mandates require very long term archiving and file fixity.


Features

Diversity in instances, data slicing, hosting options, geography, and formats. Put the data away for a long time and retrieve it with integrity and usability when you need to. Operating and application system details preserved.

We deploy advanced multi-factor authentication to ensure that you are really you.

Each user’s data is uniquely secured and protected, encrypted with the strongest encryption available. No user has the same encryption. We can’t decrypt your data – only you can. We have no idea what your data is and we cannot find out.

Selected team-based accessible only. Logs team member accesses, uploads, & downloads. Custom branding & skins available.

STASH shreds your encrypted data into Digital Confetti™ and distributes it randomly across your preferred storage mediums, be they public cloud, private cloud, or off-cloud in-house storage – or any combination.

We keep your data on a completely different network to your office network with its vulnerabilities to phishing and malware attacks. And Stash is not vulnerable to encryption ransomware software like cryptolocker.

We keep multiples of each file, in multiple locations, as well as cold storage, so your data won’t be lost or destroyed.

Regulators like the FDA will appreciate the file fixity steps we take to register who has accessed or changed the data. The STASH approach is consistent with both: •European Framework for Audit and Certification of Digital Repositories •ISO 16363: a system for the "audit and certification of trustworthy digital repositories"


End User License Agreement (EULA)

https://www.stashpersonal.com/page/terms-of-use/



You Agree to the Provider Terms of Service Associated with this Software.
Not a customer? Register now.

Other Products by Stash



company

Stash

category

Content Management System (CMS) , SaaS , Security

deployment models

operating systems

not specified

resources

demo

support

For support contact: centurylink@stash.global

contact

https://www.stashbusiness.com/centurylink