Never Let your
Data be Held Hostage

Redundant backups and our double blockchain work together to protect both security of your data and the integrity of the information held within. The Blockchain Archive Server acts as a staging point to prepare data for blockchain encryption. The system utilizes two blockchain networks in its operation: A distributed file system blockchain (DFS), which stores fragments of encrypted data across thousands of nodes, and a smart contract blockchain, which stores fragments of the private key which authorize re-assembly. Unlike other systems, both the data and keys are encrypted in a revolutionary new double-blockchain approach to data security.

 
 

First your data is copied to the BAS, encrypted, fragmented, and distributed to our secure blockchain network.

Then the private key and hashes are distributed to a separate, secure blockchain network.

Finally, your data is reassembled upon request and available for download.

 

At a high level, BAS performs all the ‘heavy lifting’ associated with aggregating, securing and archiving your mission-critical data. It also does all the work when you need to get your secure and immutable data and get it back into your systems.

The Blockchain Archive Server can live on or off premise as an 8TB server which acts as a staging point to prepare data for encryption and addition to the blockchain. To accommodate for the diversity in how organizations set up their infrastructures the BAS does not have to reside at any one particular location. Because the BAS is designed to archive your data, regardless of where that data originates your data is always accessible and always backed up. This is important because the BAS has been designed to accommodate your architecture -not the other way around.  

These can be individual files or disk images that can be backed up as often as desired. The data is encrypted using public-key cryptography, ensuring confidentiality. The encrypted files are fragmented and distributed across many nodes on the blockchain, with multiple copies of each fragment existing across thousands of nodes to ensure data integrity and availability. A private key is associated exclusively with the user which uploaded the file. With this key they are able to resolve the Hash of the uploaded file, ultimately allowing them to retrieve it. Hash addresses to the data fragments are also encrypted, fragmented and distributed out to nodes on the smart contract blockchain to ensure that data fragments can only be called back and reassembled when authorized.

In the event you need to rapidly rebuild your infrastructure after a ransomware attack (while simultaneously proving the data is immutable and uncompromised) or just demonstrate that the data is fully archived in a secure manner, your process is simple. Since the data fragments are copied across multiple nodes, downloading speeds are near the maximum bandwidth of your Internet connection and there is no additional cost to download your data. It is your data. Protected. Immutable. And available as quickly as your network allows.

Where the BAS is used

Surviving Ransomware with Sollensys
Disaster Response Timeline
Despite the best cybersecurity suite, following strict company guidelines and rigorous employee training, this client still fell victim to a ransomware attack. Within an hour of receiving notification of a breach, the Sollensys Technology team was on the ground, providing expertise in isolating the breach and cleaning and restoring their systems and infrastructure. Within 48 hours their systems were back online with pristine, uncorrupted data and systems. They never paid a ransom.
8:50AM
Sollensys’ Technology Team notified about a potential cybersecurity breach/ransomware attack on the client’s systems and was dispatched to the customer location.
8:50AM
9:30AM
Sollensys arrived on site to assess the situation, determined the extent of the spread of ransomware, and worked with the facility and owners to isolate infected systems.
9:30AM
10:00AM
Sollensys assists with recovery operations, downloading data at an offsite location and cleansing the on-site infected workstations.
10:00AM
10:30AM
Sollensys identifies the ransomware as a variant of the REvil/ Sodinokibi.
10:30AM
10:45AM
The Sollensys team found an infected mobile iCloud account that, if gone undetected, could have reinfected the client systems.
10:45AM
11:00AM
Sollensys advises the client’s technicians on vulnerabilities observed in the client environment and recommends remediation measures.
11:00AM
12:00PM
Sollensys assists in the re-imaging of the main file server, and offers a secure off-site high bandwidth environment for data recovery.
12:00PM
1:30PM
With restoration fully underway, Sollensys remains on call, maintaining close communications with the client to ensure there are no additional issues.
1:30PM
43 Hours Later
Client confirms that the primary server data restoration has been completed and verified.
43 Hours Later

*For privacy and security purposes, Sollensys' customer name is being withheld.
Customer is willing to provide verification by phone but all information must be kept confidential.

 

  • The peace of mind that comes with knowing that I am protecting my team and their livelihoods, as well as my guests… it was absolutely a no-brainer to implement the BAS.

    Chris Caprio, Ashley Furniture

  • "The ability to avoid business interruption and ensure a safe archive of sensitive client data was more than worth the investment in the BAS."

    Jason Shye, Precision Companies

  • "We’d already put a lot of cyber security tactics in place, but we had nothing like the BAS, now we feel a lot better in protecting our patients and our business."

    Laura Joslin, Ability Plus Therapy