Filebunker.co.uk © 2013 from Dezine Host.

File   Bunker Backups That Happen

Security


Security is a topic which is becoming more well known. With high profile companies being attacked everyone is trying to reassure consumers that their products and services are secure. The truth is nobody can provide guarantees however there is a lot that can be done. The difficulty is encrypting data breaks a fundamental business model in file storage, and it’s called de-duplication.












The random data created by a file being encrypted and de-duplication don’t mix. This has led some providers to ensure that they can decrypt and de-duplicate the customer’s data, and even go a step further and not transfer any duplicate data. That may sound sensible and even helpful but it fundamentally compromises your privacy and security.


It’s only proper that encrypted data remains secure and whilst File Bunker does use de-duplication, all our packages are priced on the basis that everything is encrypted and no de-duplication takes place. Nevertheless we also provide storage free from any de-duplication for a small premium.


File Bunker cannot decrypt your encrypted data - stay in control of your data and know it’s secure.


Many companies secure the perimeter of their systems leaving an insecure centre. File Bunker recognises that perimeter defences alone aren’t enough. If your data is encrypted, even if our server is compromised, your data remains encrypted and therefore secure.

De-duplication is the process of only storing one copy of something (e.g. a file) which more than one person saves. From the online storage provider’s perspective it makes no sense to store ten copies of the London tube map, far better to store one copy and make a note that 10 customers should have access to it.


Encryption is the process of performing a mathematical operation on data (e.g. a file) such that it makes no sense whatsoever until you perform another mathematical operation on the now encrypted data. These operations make use of a password (or passphrase) to uniquely scramble the data and then reform it afterwards. Two identical files encrypted suing two different passwords will be therefore utterly different.