Prizsm
Hyper-Secure Data Storage and Communications in the Public Cloud
Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.
Prizsm randomly distributes atomised information across multiple cloud storage endpoints. If any of the cloud service providers are breached, only a subset of random binary digits (bits) would be exposed and, hence, not enough data to recreate the original information.
Prizsm secures data in a resilient form so that if a cloud provider is lost or becomes unserviceable, the original information can still be retrieved by the platform.
Prizsm also provides cloud orchestration to optimise and simplify multi-cloud provisioning and management. It also enables you to easily replace cloud providers while ensuring operational continuity, overcoming the issue of cloud lock-in.
Core Components
-
Prizsm Storage
With Prizsm Storage, you can benefit from cheap elastic cloud storage services in an inherently secure way. The solution provides a centralised place where you can safely store-and-retrieve digital files.
The approach to disaggregated cloud storage is mapped in traditional terms but delivered virtually, meaning organisations can deploy it transparently, without impacting or changing any of their existing business processes and workflows.
Sitting between users and the cloud, Prizsm Storage enables you to take back control of your information and the data that underpins it.
-
Prizsm Edge
Prizsm Edge extends Prizsm Storage to provide a store-and-forward communication capability.
It has been designed for use in Edge Computing and IoT environments or any scenario where information needs to be securely shared.
The design enables multiple independent channels to share the same cloud storage without risk of crosstalk.
Channels can be configured one to one, many to one, one to many, or many to many depending on your use-cases.
-
Priszm Key
Prizsm Key uses the Prizsm algorithm to enable secure key sharing.
It disaggregates cryptographic keys and secrets into redundant, complementary bit patterns that can be transmitted via discrete channels for reaggregation by the intended recipient.
How it works
The Prizsm Platform disrupts data at bit-level and randomly distributes redundant, complementary binary digits to locations across multiple cloud platforms. This ensures each binary digit is not related to the adjacent bits. If any of the cloud providers are breached, only random bits would be disclosed. If a cloud provider becomes unserviceable, or connection to the service is lost, Prizsm’s redundant, complementary storage method ensures data and the information it conveys can still be accessed via the platform.
Prizsm also provides cloud orchestration to control how much data is managed on which clouds and provides the ability to move cloud providers to overcome the problem of cloud lock-in.