Unity Active Archive is tightly integrated optional component of Unity, providing a complete multi-tier data management solution. Not only does it enable organizations to meet regulatory demands but it protects your data from ransomware attacks, silent data corruption and accidental deletion. If Unity Active Archive discovers lost or corrupted data during regular background maintenance sweeps, it will fix it first then let you know that a problem has been handled. Restoring data lost from a catastrophe has never been easier.
Like Unity Active Archive, Assureon’s advanced archive and security features make it ideal for primary storage optimization, regulatory and corporate compliance, and the secure, long-term retention of files. It offloads data from primary storage to free up space for active data and greatly reduces the size, cost and complexity of backups. Security features comply with corporate and governmental regulatory requirements including HIPAA, SOX and SEC-17.
Fingerprints using both MD5 and SHA1 hash of content and metadata, insuring history and contents cannot be altered after the fact.
Makes two copies of the file and its fingerprint are stored in a separate RAID disk set either in the same system or a remote one.
Serial numbers are assigned to each individual file to ensure no files are changed, missing, or inappropriately added.
Use of a global, redundant, secure time source using Stratum Level 1 hardware time sources to ensure accurate time stamp.
Continually verifies against fingerprints and repairs using copies and safeguarded by RAID disk arrays for days or even decades.
Governmental and Corporate compliance of HIPAA, GLBA, Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), SEC 17A-4 and PCI DSS.
Files are individually encrypted with its own AES-256 key to provide separation, security, and reporting of data for each client, enabling easy import into billing systems.
Archiving unstructured and infrequently used data frees up primary data and dramatically reducing the size, time and cost of the backup process.
Ensures adherence to guidelines for data retention, disposition, privacy, protection, chain of custody, litigation readiness and risk mitigation.