
THE MOST SECURE FILE SYSTEM
B
Taekion Secure
File System
Defend critical data with an immutable, tamper-proof data store: Taekion TFS™.
*BETA V 1.0 OF TAEKION CORE FOR TESTING
Available Q1 2021
*TFS V 1.0 BETA AVAILABLE Q1 2022
TRUST YOUR DATA
Safe & Verifiable
At Taekion, we build software that keeps data safe, tamper resistant, verifiable, and trusted over the system’s life cycle. The TFS™ platform is simple to integrate with common server infrastructure, operating systems, and networks. On upload, data is safe to trust, tamper-proof and verifiable during transit and for the system’s entire life cycle. The mathematically proven files, are easy to verify for audits and compliance.

Step 1
Identify
Critical Data
Organizations rely on critical data to run mission critical operations. This data is stored in a variety of unix based file systems with support for S3 and Kubernetes coming soon. The critical data can be any file and stored in structured and unstructured formats. Data can also be from sources such as log files, configuration and settings data used to operate complex systems, as well as run critical decision making systems such as AI-based machine learning models.

Step 2
Protect Data
Defensively
Once the data has been identified, simply import that data into TFS™ which can mimic the structure that the structure the data had been stored in, or create a new file based structure.. Any service or software that is set to store data in a file system is ready to use TFS™. TFS™ mounts as a standard UNIX based volume on standard operating systems like Linux, Mac or Windows. S3 and Kubernetes Persistent volumes coming soon. A simple drop, through a standard file system interface, locks data into a distributed, secure data storage service.

Step 3
Manage Secure
Data Service
The Taekion TFS™ and BTP Sextant™ management console present an integrated solution in an easy to use blockchain-based trusted data solution. The product is designed to be simple to integrate and maintain using one-click deployment. An admin can add a new data volume, a data snapshot or a new distributed node in seconds. Integration into a a SOAR console or SIEM framework via API’s integrates data protection into standard cybersecurity frameworks.

Step 4
Assess Data
in Real-Time
TFS™ provides real-time notifications based on any change user selected parameters. These changes can be sent to any SIEM monitoring dashboard with its enabling API’s. In addition, snapshots allow users to quickly compare the differences between two versions of files at two points in time to ensure that the data has not changed. Since data is captured at write TFS™ can also deliver notification of modifications to files immediately as they occur. With real-time notifications, halt data breaches before financial risk, rather than only insuring for after the damage is done. With four, easy steps, our most secure file system is simple to install, but impossible to bypass.
Platform Concepts
Features
full-on blockchain
Drop in Replacement
Replace a Linux or Unix-based file system with a networked file system backed by full on-blockchain storage and mountable as an industry standard file system on a diverse array of systems. Drop in S3 & Kubernetes compatible systems coming soon. We provide a blockchain that operates like a regular file system. There is no need for end users to learn a new way of interacting with data including ability to search and audit the system data with standard tools. BETA FEATURES
compare points
Snapshots forever
Snapshots, provide an immutable record of of the file system at a specific point in time, with no additional storage overhead. The use of Snapshots allows users to quickly compare the differences in two points in time to ensure that the data has or has not changed within the specified range as well as perform near real time data auditing. Snapshots enable real-time data anomaly protection and digital forensics capabilities. FUTURE AVAILABILITY
Resilience
Asynchronous Support
TFS™ elegantly withstands network partitions with asynchronous queuing and a real-time, write-ahead journal. Hash-chained to detect changes while susceptible to tampering during transit. This allows TFS to be widely distributed without fear of data loss. TFS is able to maintain local state integrity (ordering and timestamps) even when the network is subject to crash faults, byzantine faults, and network partitions. FUTURE AVAILABILITY
Protected Dataset
Full Data on Chain
Unlike alternatives, the full file is stored, visible, and ready for regular system operation. Synchronously, the entire dataset is protected from manipulation. Cut out separate datastores for comparison files are accomplished with standard methods providing a full audit trail and forensics capabilities. This allows users to maintain all of their critical data in an immutable, tamper-proof data store.
WIRE SPEED
Fast Data Engine
Protect data at wire speed using the TFS™ hash-chained, real-time journal prior to being confirmed by the mathematically proven consensus algorithm to the underlying immutable blockchain. This maintains local state data integrity as well as original ordering. Advanced features include built-in compression, encryption, and “copy on write” deduplication reducing blockchain storage requirements. FUTURE AVAILABILITY