Trusted. Proven. Secure.
Protect Your Assets with CAS
Nearly 1 million new malware threats are released every day,* and online intellectual property theft is “the greatest transfer of wealth in history,” according to former NSA Director General Keith Alexander. The FBI asserts corporate espionage cases in the US rose 53% during 2015. No organization is too small to be targeted. With built-in defenses, including sophisticated encryption-at-rest and in transit, CAS is rigorously tested and hardened from external vectors and security threats. And organizations can fully integrate and layer on their own security technologies and protocols. Secure archiving with CAS—Secure by design.
While many of the leading archiving solutions are only available “in the cloud,” affording you little control, CAS provides the flexibility of being installed on premise, where direct control over its security is possible. Organizations can fully integrate and layer on their own security technologies and protocols, a feature not available with third-party cloud systems. No other archiving solution provides this level of flexibility to fulfill any number of security requirements, including standards such as FIPS 140-2, COBIT, ISO/IEC 27001/27002:2013, ISO/IEC 27018:2014, CJIS, FDA 21 CFR Part 11, FERPA, FISMA, SOC 1/SSAE 16/ISAE 3402 and SOC 2, and many others.
CAS uses 256-bit AES encryption at rest. CAS user authentication is via 256-bit SSL encryption. Data is protected using forced 2048-bit SSL and TLS encryption.
Socially engineered hacking, where corporate data is exposed via inattentive cloud vendor employees, accounts for one of the greatest threats organizations face. With CAS, you control how your archive is managed and which employees or vendors can access your system.
As an advanced security module, CAS learns normal and abnormal behaviors and workloads, building baseline trends to identify unusual activities and threats. By leveraging sophisticated machine learning, this automated analysis provides a strong defense against internal and external cyber attacks.
Managed data is secure data—CAS provides sophisticated oversight for data that otherwise would be unmanaged. As an important component in your organization’s data loss prevention (DLP) strategy, CAS delivers control and management capabilities over your data.