What Is The Blockchain Archive Server?

Ransomware is one of the biggest threats to our digital livelihood. Since 2016, over 4,000 ransomware attacks have occurred daily in the United States (justice.gov). As of October 1, 2021, The U.S. Department of Treasury warns that paying a ransom is now illegal under certain conditions (treasury.gov).

No company is safe from ransomware, especially those organizations that make up national critical infrastructures and resources. New ransomware strains identified in early 2020 target industrial control systems and can kill critical software control processes before revoking system access completely.

Making The World Safer, One Block at a Time
The simplicity of the Blockchain Archive Server (BAS) is quite extraordinary. BAS performs all the ‘heavy lifting’ associated with aggregating, securing, and archiving your critical data. It also does the work when you need to access that valuable information.

While the BAS cannot stop an attacker from targeting your business—or keep cybercriminals from compromising, copying, and exfiltrating your data—it does assist in the archiving and reconstitution of your mission-critical assets and information infrastructures after a cyber attack.

How The Sollensys BAS Works
The BAS acts as a staging point to prepare data for blockchain encryption. The system utilizes two blockchain networks: A distributed file system blockchain, which stores fragments of encrypted data across thousands of nodes, and a smart contract blockchain, which stores pieces of the private key that authorize re-assembly. Unlike other systems, both the data and keys are encrypted in a revolutionary new double-blockchain approach to data security.

  1. Data is copied to the BAS, encrypted, fragmented, and distributed to our secure blockchain network.

  2. The private key and hashes are distributed to a separate, secure blockchain network.

  3. Your data is reassembled upon request and available for download.

 

The process to rebuild your infrastructure after a ransomware attack is simple. A secure physical USB key unique to your data is used at the BAS terminal to authorize data reconstitution and call back the data fragments using the unique hash addresses assigned to each component. The use of physical keys ensures that only authorized users in your organization have access to the data.

NEVER Pay a Ransom
Despite the best cybersecurity suite, following strict company guidelines, and rigorous employee training, it is still possible to fall victim to a ransomware attack. Within an hour of receiving notification of a breach, the Sollensys Technology team can be on the ground, providing expertise in isolating the problem, cleaning, and restoring your systems. Within 48 hours we can have a business back online with pristine, uncorrupted data and infastructure.

View the Sollensys Disaster Response Timeline

Ready to Learn More?
Download Our BAS White Paper

Previous
Previous

Not Your Typical Cloud Storage Solution

Next
Next

‘Why I Did This’ By Sollensys CEO, Don Beavers