Data Immutability Technology
Safety and Reliability: WORM Compliant Cloud Storage
Data Immutability
Data Immutability Technology can archive data in non-rewritable, non-erasable format. Using this method, recorded data can no longer be overwritten, modified or manipulated.
The Data Immutability protection process offered by QStar complies with the strictest national and international regulations covering sensitive data archiving, document management, electronic record storage and log file archiving. The Data Immutability solution developed by Qstar guarantees secure, legally-admissible, long-term retention of archived data.
Data Immutability solution has been also adopted as a secure storage technology for sensitive log files in telecommunications by law enforcement investigations.
Data Immutability technology fields of application
Implementation of WORM Data Storage & Data Immutability
Data Immutability can be up and running in less than one hour.
The Data Immutability solution is completely transparent to applications and users, does not require any changes to the existing infrastructure, software or the way archived information is accessed, provides high performance and very low purchase and operating costs. Data Immutability software can be installed within an existing infrastructure with no need to purchase new hardware. It is extremely simple to install and configure both on physical and virtual servers (VMware, Hyper-V, etc.).

Data Immutability does not require separate backup procedures.
Data Immutability offers a secure environment which, among other things, is auto-consistent and therefore does not require separate backup procedures.
High availability & Disaster recovery
Data Immutability can be also offered in a fault tolerance configuration with 99.999% system uptime. Data Immutability configurations include disaster recovery and geographic distribution for the most critical applications that must ensure maximum operational continuity.
A retention period is established for a single file or for each volume designated as Data Immutability.
Depending on the specific needs, the retention period can be set to expire after a certain number of months or years, or never for permanent retention. As soon as a volume is designated Data Immutability, files in that volume are automatically locked and cannot be later modified.
Data encryption
All data stored in Data Immutability mode can be encrypted to prevent sensitive data being read by unauthorized personnel.
Log file Data Immutability archiving
Log files are increasingly used to track incoming and outgoing activities such as in the field of communications. Log files from the network service provider, the provider hosting the website that the user is browsing, mailbox access logs, log files generated by mobile phone cells that enable location tracking, and so on. Examination of the log files allows you to track the person who has performed certain operations using the IT and telecommunications tools at their disposal. Traditional backup solutions are not able to save such data in a timely manner.
The Data Immutability solution can efficiently archive massive numbers of small files (hundreds of millions) like log files without suffering performance loss, an essential requirement when archiving this kind of information created by IT systems. In addition, QStar has developed specific policies to protect archived logs even in the event of a disaster. The Data Immutability solution for log file archiving is used by major international companies, including telecommunications companies that store billions of log files using Data Immutability technology.

Data Immutability and virtual machine (VM) environments
Data Immutability software can also be installed in virtual machine (VM) environments such as VMware, Microsoft Hyper-V, Citrix XenServer, Oracle VM and KVM. The Data Immutability software allows you to use existing storage by simply allocating storage space for protecting archived data in Data Immutability mode, in this way reducing investments in hardware. The Data Immutability software is virtually compatible with any commercial RAID system.

Related Solutions For WORM Compliant Cloud Storage

The QStar Kaleidos is an S3-compliant object storage platform that enables enterprises and service providers to build reliable, private, hybrid or public cloud storage environments that deliver reliability, security and unlimited scalability.
Kaleidos offers enterprise-class customers a tremendous reduction in TCO compared with traditional NAS/SAN storage, unlimited scalability, superior data protection and flexibility, while achieving improved customer retention through enhanced service delivery (SLA), reduced acquisition costs, and enhanced agility through global accessibility across all end user devices.
Kaleidos Object Storage is made with standard high-performance capacity servers. QStar Object Storage Manager (OSM) software runs on all server nodes and forms a cluster to provide a single pool of storage resources across all nodes.

QStar Storage Reporter lets you perform detailed analysis of data composition in the existing storage infrastructure, provides key statistics on existing storage infrastructures without interrupting business operations. Storage Reporter will take just a few hours to perform an assessment of storage rather than the weeks normally required to carry out such a task. Storage Reporter is simple to install and run. Results of the scan are stored in a database, allowing many reports to be generated without the need to rescan each time. QStar Storage Reporter means that storage infrastructure optimization is really just a click away. Key report formats are conveniently pre-configured and results can be displayed graphically or non-graphically (table format). Custom reports can also be created, as needed. Any report can be exported as a txt or xml file, by selecting the Export button. Once exported, the file can be opened using MS Excel. Running Simulated Reports is a way of determining how the storage would look after a migration has taken place in order to create a simulated report a policy must be created.