
THE MOST SECURE FILE SYSTEM
Taekion
File System
Defend critical data with an Enterprise-Grad, IMMUTABLE, tamper-proof data store
TRUST YOUR DATA
Safe & Verifiable
At Taekion, we build software that keeps data safe, tamper resistant, verifiable, and trusted over the system’s life cycle. The TFS™ platform is simple to integrate with common server infrastructure, operating systems, and networks. On upload, data is safe to trust, tamper-proof and verifiable during transit and for the system’s entire life cycle. The mathematically proven files, are easy to verify for audits and compliance.

Step 1
Identify
Critical Data
Organizations rely on critical data to run mission critical operations. This data is stored in a variety of unix based file systems with support for S3 and Kubernetes coming soon. The critical data can be any file and stored in structured and unstructured formats. Data can also be from sources such as log files, configuration and settings data used to operate complex systems, as well as run critical decision making systems such as AI-based machine learning models.

Step 2
Protect Data
Defensively
Once the data has been identified, simply import that data into TFS™ which can mimic the structure that the structure the data had been stored in, or create a new file based structure.. Any service or software that is set to store data in a file system is ready to use TFS™. TFS™ mounts as a standard UNIX based volume on standard operating systems like Linux, Mac or Windows. S3 and Kubernetes Persistent volumes coming soon. A simple drop, through a standard file system interface, locks data into a distributed, secure data storage service.

Step 3
Manage Secure
Data Service
The Taekion TFS™ and BTP Sextant™ management console present an integrated solution in an easy to use blockchain-based trusted data solution. The product is designed to be simple to integrate and maintain using one-click deployment. An admin can add a new data volume, a data snapshot or a new distributed node in seconds. Integration into a a SOAR console or SIEM framework via API’s integrates data protection into standard cybersecurity frameworks.

Step 4
Assess Data
in Real-Time
TFS™ provides real-time notifications based on any change user selected parameters. These changes can be sent to any SIEM monitoring dashboard with its enabling API’s. In addition, snapshots allow users to quickly compare the differences between two versions of files at two points in time to ensure that the data has not changed. Since data is captured at write TFS™ can also deliver notification of modifications to files immediately as they occur. With real-time notifications, halt data breaches before financial risk, rather than only insuring for after the damage is done.
Platform Concepts
Features
Drop in Replacement
Replace a Linux or Unix-based file system with a networked file system backed by full on-blockchain storage and mountable as an industry standard file system on a diverse array of systems. Drop in S3 & Kubernetes compatible systems. There is no need for end users to learn a new way of interacting with data including ability to search and audit the system data with standard tools.
Snapshots forever
Snapshots, provide an immutable record of of the file system at a specific point in time, with no additional storage overhead. The use of Snapshots allows users to quickly compare the differences in two points in time to perform near real time data auditing. Snapshots enable real-time data anomaly protection and digital forensics capabilities.
Asynchronous Support
TFS™ withstands network partitions with asynchronous queuing and a real-time hash-chained journal to detect changes during transit. This allows TFS to be widely distributed without fear of data loss. TFS is able to maintain local state integrity even when the network is subject to crash faults, byzantine faults, and network partitions.
Full Data on Chain
Unlike alternatives, the full file is stored, visible, and ready for regular system operation. The entire dataset is protected from manipulation. Comparison files are accomplished with standard methods providing a full audit trail and forensics capabilities. This allows users to maintain all of their critical data in an immutable, tamper-proof data store.
Fast Data Engine
Protect data at wire speed using the TFS™ real-time journal prior to being confirmed by the consensus algorithm This maintains local state data integrity as well as original ordering. Advanced features include built-in compression, encryption, and “copy on write” deduplication reducing blockchain storage requirements.