• Home
  • Products
  • Solutions
  • Blog
  • Company
  • Home
  • Products
  • Solutions
  • Blog
  • Team
  • Partners
  • Contact
Icon representation of interlocking shapes of Taekion's data security for our most secure file system.

THE MOST SECURE FILE SYSTEM

B

Taekion Secure 
File System

Defend critical data with an immutable, tamper-proof data store: Taekion TFS™.

*BETA V 1.0 OF TAEKION CORE FOR TESTING 

Available Q1 2021

*TFS V 1.0 BETA AVAILABLE Q1 2022

  • Overview
  • Principles
  • Features

TRUST YOUR DATA

Safe & Verifiable 

At Taekion, we build software that keeps data safe, tamper resistant, verifiable, and trusted over the system’s life cycle. The TFS™ platform is simple to integrate with common server infrastructure, operating systems, and networks.  On upload, data is safe to trust, tamper-proof and verifiable during transit and for the system’s entire life cycle.  The mathematically proven files, are easy to verify for audits and compliance.

An icon representation for Step 1 of utilizing our most secure file system: an open cube with a smaller cube inside.

Step 1

Identify
Critical Data

Organizations rely on critical data to run mission critical operations.  This data is stored in a variety of unix based file systems with support for S3 and Kubernetes coming soon. The critical data can be any file and stored in structured and unstructured formats.  Data can also be from sources such as log files, configuration and settings data used to operate complex systems,  as well as run critical decision making systems such as AI-based machine learning models.  

An icon representation of Step Two of set-up for our secure file system encrypted protection: a cube with open spaces.

Step 2

Protect Data

Defensively

Once the data has been identified, simply import that data into TFS™ which can mimic the structure that the structure the data had been stored in, or create a new file based structure.. Any service or software that is set to store data in a file system is ready to use TFS™.  TFS™ mounts as a standard UNIX based volume on standard operating systems like Linux, Mac or Windows. S3 and Kubernetes Persistent volumes coming soon. A simple drop, through a standard file system interface, locks data into a distributed, secure data storage service.

Step 3

Manage Secure

Data Service

The Taekion TFS™ and BTP Sextant™ management console present an integrated solution in an easy to use blockchain-based trusted data solution. The product is designed to be simple to integrate and maintain using one-click deployment.  An admin can add a new data volume, a data snapshot or a new distributed node in seconds. Integration into a a SOAR console or SIEM framework via API’s integrates data protection into standard cybersecurity frameworks.

Step 4

Assess Data

in Real-Time

TFS™ provides real-time notifications based on any change user selected parameters. These changes can be sent to any SIEM monitoring dashboard with its enabling API’s. In addition, snapshots allow users to quickly compare the differences between two versions of files at two points in time to ensure that the data has not changed. Since data is captured at write TFS™ can also deliver notification of modifications to files immediately as they occur. With real-time notifications, halt data breaches before financial risk, rather than only insuring for after the damage is done. With four, easy steps, our most secure file system is simple to install, but impossible to bypass. 

Platform Concepts

Features

full-on blockchain

Drop in Replacement

Replace a Linux or Unix-based file system with a networked file system backed by full on-blockchain storage and mountable as an industry standard file system on a diverse array of systems. Drop in S3 & Kubernetes compatible systems coming soon. We provide a blockchain that operates like a regular file system.   There is no need for end users to learn a new way of interacting with data including ability to search and audit the system data with standard tools. BETA FEATURES

compare points

Snapshots forever

Snapshots, provide an immutable record of of the file system at a specific point in time, with no additional storage overhead. The use of Snapshots allows users to quickly compare the differences in two points in time to ensure that the data has or has not changed within the specified range as well as perform near real time data auditing.  Snapshots enable real-time data anomaly protection and digital forensics capabilities.  FUTURE AVAILABILITY

 Resilience

Asynchronous Support

TFS™ elegantly withstands network partitions with asynchronous queuing and a real-time, write-ahead journal. Hash-chained to detect changes while susceptible to tampering during transit. This allows TFS to be widely distributed without fear of data loss. TFS is able to maintain local state integrity (ordering and timestamps) even when the network is subject to crash faults, byzantine faults, and network partitions.  FUTURE AVAILABILITY

Protected Dataset

Full Data on Chain

Unlike alternatives, the full file is stored, visible, and ready for regular system operation. Synchronously, the entire dataset is protected from manipulation. Cut out separate datastores for comparison files are accomplished with standard methods providing a full audit trail and forensics capabilities. This allows users to maintain all of their critical data in an immutable, tamper-proof data store.  

WIRE SPEED

Fast Data Engine

Protect data at wire speed using the TFS™ hash-chained, real-time journal prior to being confirmed by the mathematically proven consensus algorithm to the underlying  immutable blockchain. This maintains local state data integrity as well as original ordering. Advanced features include built-in compression, encryption, and “copy on write” deduplication reducing blockchain storage requirements. FUTURE AVAILABILITY

Do you have data streams that need critical protection?

Lock it down

Taekion

  • Home
  • Products
  • Solutions
  • Blog
  • Company

© 2021 Grid7 LLC DBA Taekion. All Rights Reserved | Privacy Policy | Contact