Contact Us

Assureon® protects your information better than any other solution on the market.

Assureon’s advanced security and data integrity features make it ideal for primary storage optimization, regulatory and corporate compliance, and the secure, long-term retention of files. It offloads data from primary storage to free up space for active data and greatly reduces the size, cost and complexity of backups. Security features comply with corporate and governmental regulatory requirements including HIPAA, CJIS, GDPR, PCI-DSS, SOX, SEC-17 and WORM.

Assureon Software gives you the flexibility of selecting a deployment option that best fits your organization’s infrastructure strategy. Assureon software can be implemented in a public cloud or on-premise. The software can be deployed on any standard or virtualized server.

Download the Assureon Datasheet

 

 

 

"Assureon saves us time and money. There are lots of solutions out there, but [Assureon] is the one that satisfies our needs. It hasn't failed us."

Albert Fuller, California Public Utilities Commission

ACTIVE DATA VAULT

There is some data that is too important to lose, too private to be seen and too critical to be tampered with. Up to 80% of data on primary storage is unstructured and either never changes or changes infrequently but it’s imperative that you keep and protect this data. This data can be easily offloaded from expensive primary storage to cost-effective Nexsan Assureon without any disruption to ongoing operations. Plus Assureon is designed to be regulatory compliant and tamper-proof from even the harshest ransomware attacks.

As malware is now also targeting backups, Assureon, in conjunction with Unity, provides an Unbreakable Backup™ which the last line of defense to protect backups from any malware, ransomware attacks, or user error so organizations can recover backups from a worst-case
scenario.

 

 

Software Edition

Software Edition

Flexibility to implement in the cloud, hybrid cloud or on-premise.

File Fingerprinting

File Fingerprinting

Secure Digital Fingerprints utilizes a combination of two cryptographic hashes for a unique file identifier.

File Redundancy

File Redundancy

Makes two copies of the file and its fingerprint are stored in a separate RAID disk set either in the same system or a remote one.

File Serialization

File Serialization

Serial numbers are assigned to each individual file to ensure no files are changed, missing, or inappropriately added.

Secure Time Stamp

Secure Time Stamp

Use of a global, redundant, secure time source using Stratum Level 1 hardware time sources to ensure accurate time stamp.

Auto File Repair

Auto File Repair

Continually verifies against fingerprints and repairs using copies and safeguarded by RAID disk arrays for days or even decades.

Regulatory Compliance

Regulatory Compliance

Governmental and Corporate compliance of HIPAA, GLBA, Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), SEC 17A-4 and PCI DSS.

Storage Optimization

Storage Optimization

Archiving unstructured and infrequently used data frees up primary data and dramatically reducing the size, time and cost of the backup process.

Data Longevity

Data Longevity

Ensures adherence to guidelines for data retention, disposition, privacy, protection, chain of custody, litigation readiness and risk mitigation.