SlideShare a Scribd company logo
1 of 1
Download to read offline
“Horatio Private Secure Cloud”




The IT investment estimates for medium and large Italian companies for 2012, in the infrastructure field, are focused on security, business
continuity and disaster recovery. This appears from the data of the latest Cio Survey carried out by NetConsulting. Another, more detailed
report, prepared by Nextvalue and consisting of the Information Security Management theme, pointed out that most of the large Italian
companies today consider very critical and significant the impact of the security solutions on business processes concerning the budget
allocated to this segment and which currently cover only 5% of that intended for the whole computer process.
Source: Corriere delle comunicazioni (Courier Communications) (link: http://www.corrierecomunicazioni.it/it-world/12481_cloud-i-guasti-
informatici-prima-causa-di-perdita-di-dati.htm )


Description of the infrastructure
 esc
DSS has two server farms dedicated to Horatio, the Private Secure Backup Cloud service located in highly strategic
geographical areas, in order to ensure continuity of the supplied services. The data centers that house the two server farms
are certified facilities which make use of technological systems designed and manufactured in order to drastically reduce
energy consumption compared to equivalent traditional systems and, consequently, to contain considerably the CO2
emissions significantly.

Horatio Data Protection System

Horatio Private Secure Cloud is a remote data protection service that allows backup and data restoring through a
                        Cloud
dedicated application software and a specific web application.

Horatio uses a dedicated algorithm operating on the HTTP Protocol with SSL encryption in order to ensure the transferring
of the data from the source to be protected to the archiving-dedicated structure in an efficient and safe way.

The use of this methodology allows HORATIO to be a firewall friendly solution; i.e. the service does not require any
dedicated devices to cross the firewalling barriers as the standard internet communication channel is used.

Horatio makes efficient use of the internet bandwidth used for the backup process through the use of data compression
combined with the deduplication incremental mechanism and ensures data security through a 256-bit AES encryption.
Horatio exploits the versioning system of the files in such a way as to maintain, according to a predetermined retention,
multiple versions of the same protected file.

Horatio is a multi-platform solution and can work on multiple operating systems found on the market today.
The service aims at supporting the client in maintaining continuity of business operations, giving them the tools they need
to perform on a daily basis and in a totally automated way, the electronic transfer and remote storage of data to be saved,
directly from the Server and from the PC to a safe backup infrastructure cloud.

Thus, the service allows:
- the use of the filing infrastructure, software, management and monitoring system that enable the supplying and
implementation of the Service;
- to keep the different versions of the files selected for the backup;
- to restore the data when requested.




                      Data Storage Security s.r.l società unipersonale - Cod. Fisc./P.IVA 01548880333 - Cap. Soc. €.100.000 i.v.
                    Sede Legale:            PIACENZA Via Poggiali, 43 - 29121 Piacenza (PC) Tel. (+39) 0523.33.46.40 Fax (+39) 0523.32.88.31
                    Sedi Operative:         FIDENZA       Via La Bionda 16 - 43036 Fidenza (PR) Tel. (+39) 0524.52.35.21 Fax (+39) 0524.81.994
                                            FICULLE       Loc. San Lazzaro, 2 - 05016 Ficulle (TR)
                    Sito: www.dssecurity.it Email: gestione@dssecurity.it

More Related Content

What's hot

Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for TitusSeclore
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | SecloreSeclore
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security Seclore
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreSeclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - SecloreSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Seclore
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionMichelle Guerrero Montalvo
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecuritySeclore
 

What's hot (20)

Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for Titus
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - Seclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 
Data Security
Data SecurityData Security
Data Security
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 

Viewers also liked

Comp tia a+ ce certificate
Comp tia a+ ce certificateComp tia a+ ce certificate
Comp tia a+ ce certificatebasrawi
 
Presentacion
PresentacionPresentacion
Presentacionefraile
 
Autism leafle-awareness-fr
Autism leafle-awareness-frAutism leafle-awareness-fr
Autism leafle-awareness-frMarta Montoro
 
Objetivos de la intervención
Objetivos de la intervenciónObjetivos de la intervención
Objetivos de la intervenciónPedro L.F.
 
Thomas R Beck resume final
Thomas R Beck resume finalThomas R Beck resume final
Thomas R Beck resume finalThomas Beck
 
Fox brains consultants (3)
Fox brains consultants (3)Fox brains consultants (3)
Fox brains consultants (3)foxbrains3
 
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSelling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSri Harsha Govardhana
 
Normativa+del+producto
Normativa+del+productoNormativa+del+producto
Normativa+del+productoJuan Pablo
 

Viewers also liked (15)

Catalogo mitica 3
Catalogo mitica 3 Catalogo mitica 3
Catalogo mitica 3
 
Challenge kanban
Challenge kanbanChallenge kanban
Challenge kanban
 
1 9 488
1 9 4881 9 488
1 9 488
 
Comp tia a+ ce certificate
Comp tia a+ ce certificateComp tia a+ ce certificate
Comp tia a+ ce certificate
 
Presentacion
PresentacionPresentacion
Presentacion
 
Autism leafle-awareness-fr
Autism leafle-awareness-frAutism leafle-awareness-fr
Autism leafle-awareness-fr
 
Srm ppt
Srm pptSrm ppt
Srm ppt
 
Producto
ProductoProducto
Producto
 
Kasvatus kannattaa juliste
Kasvatus kannattaa julisteKasvatus kannattaa juliste
Kasvatus kannattaa juliste
 
Objetivos de la intervención
Objetivos de la intervenciónObjetivos de la intervención
Objetivos de la intervención
 
Thomas R Beck resume final
Thomas R Beck resume finalThomas R Beck resume final
Thomas R Beck resume final
 
Fox brains consultants (3)
Fox brains consultants (3)Fox brains consultants (3)
Fox brains consultants (3)
 
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSelling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
 
Lunes
LunesLunes
Lunes
 
Normativa+del+producto
Normativa+del+productoNormativa+del+producto
Normativa+del+producto
 

Similar to Slideshare horatio eng

IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionDaniel Sapir
 
20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICTRedit
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTRedit
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICTRedit
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 

Similar to Slideshare horatio eng (20)

DSS Horatio Secure Cloud
DSS Horatio Secure Cloud DSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final Version
 
20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT
 
DSS HORATIO SECURE CLOUD
DSS HORATIO SECURE CLOUDDSS HORATIO SECURE CLOUD
DSS HORATIO SECURE CLOUD
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICT
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Security PFE
Security PFESecurity PFE
Security PFE
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 

More from Data Storage Security S.r.l. (11)

DSS Horatio Secure Cloud
DSS Horatio Secure CloudDSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
DSS Horatio Secure Cloud Backup
DSS Horatio Secure Cloud BackupDSS Horatio Secure Cloud Backup
DSS Horatio Secure Cloud Backup
 
DSS Horatio Secure Cloud Plus
DSS Horatio Secure Cloud PlusDSS Horatio Secure Cloud Plus
DSS Horatio Secure Cloud Plus
 
DSS Horatio Secure Cloud Drive
DSS Horatio Secure Cloud DriveDSS Horatio Secure Cloud Drive
DSS Horatio Secure Cloud Drive
 
DSS Horatio Secure Cloud
DSS Horatio Secure CloudDSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
DSS Media Off Site Storage
DSS Media Off Site StorageDSS Media Off Site Storage
DSS Media Off Site Storage
 
Brochure Horatio Secure Cloud
Brochure Horatio Secure CloudBrochure Horatio Secure Cloud
Brochure Horatio Secure Cloud
 
Slideshare archivio cartaceo eng
Slideshare  archivio cartaceo engSlideshare  archivio cartaceo eng
Slideshare archivio cartaceo eng
 
Slideshare archivio cartaceo it
Slideshare  archivio cartaceo itSlideshare  archivio cartaceo it
Slideshare archivio cartaceo it
 
Slideshare horatio it
Slideshare  horatio itSlideshare  horatio it
Slideshare horatio it
 
Slideshare oss 2012
Slideshare oss 2012Slideshare oss 2012
Slideshare oss 2012
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Slideshare horatio eng

  • 1. “Horatio Private Secure Cloud” The IT investment estimates for medium and large Italian companies for 2012, in the infrastructure field, are focused on security, business continuity and disaster recovery. This appears from the data of the latest Cio Survey carried out by NetConsulting. Another, more detailed report, prepared by Nextvalue and consisting of the Information Security Management theme, pointed out that most of the large Italian companies today consider very critical and significant the impact of the security solutions on business processes concerning the budget allocated to this segment and which currently cover only 5% of that intended for the whole computer process. Source: Corriere delle comunicazioni (Courier Communications) (link: http://www.corrierecomunicazioni.it/it-world/12481_cloud-i-guasti- informatici-prima-causa-di-perdita-di-dati.htm ) Description of the infrastructure esc DSS has two server farms dedicated to Horatio, the Private Secure Backup Cloud service located in highly strategic geographical areas, in order to ensure continuity of the supplied services. The data centers that house the two server farms are certified facilities which make use of technological systems designed and manufactured in order to drastically reduce energy consumption compared to equivalent traditional systems and, consequently, to contain considerably the CO2 emissions significantly. Horatio Data Protection System Horatio Private Secure Cloud is a remote data protection service that allows backup and data restoring through a Cloud dedicated application software and a specific web application. Horatio uses a dedicated algorithm operating on the HTTP Protocol with SSL encryption in order to ensure the transferring of the data from the source to be protected to the archiving-dedicated structure in an efficient and safe way. The use of this methodology allows HORATIO to be a firewall friendly solution; i.e. the service does not require any dedicated devices to cross the firewalling barriers as the standard internet communication channel is used. Horatio makes efficient use of the internet bandwidth used for the backup process through the use of data compression combined with the deduplication incremental mechanism and ensures data security through a 256-bit AES encryption. Horatio exploits the versioning system of the files in such a way as to maintain, according to a predetermined retention, multiple versions of the same protected file. Horatio is a multi-platform solution and can work on multiple operating systems found on the market today. The service aims at supporting the client in maintaining continuity of business operations, giving them the tools they need to perform on a daily basis and in a totally automated way, the electronic transfer and remote storage of data to be saved, directly from the Server and from the PC to a safe backup infrastructure cloud. Thus, the service allows: - the use of the filing infrastructure, software, management and monitoring system that enable the supplying and implementation of the Service; - to keep the different versions of the files selected for the backup; - to restore the data when requested. Data Storage Security s.r.l società unipersonale - Cod. Fisc./P.IVA 01548880333 - Cap. Soc. €.100.000 i.v. Sede Legale: PIACENZA Via Poggiali, 43 - 29121 Piacenza (PC) Tel. (+39) 0523.33.46.40 Fax (+39) 0523.32.88.31 Sedi Operative: FIDENZA Via La Bionda 16 - 43036 Fidenza (PR) Tel. (+39) 0524.52.35.21 Fax (+39) 0524.81.994 FICULLE Loc. San Lazzaro, 2 - 05016 Ficulle (TR) Sito: www.dssecurity.it Email: gestione@dssecurity.it