Contact Us
Home Products Technology

End-to-End Security

On-Premises to Cloud Enterprise-Grade Security

CTERA allows customers to control all levels of security independent of their choice of cloud infrastructure. This includes built-in data-at-rest encryption, data-in-transit encryption, Active Directory or LDAP user authentication with single sign-on, and data integrity verification.

Strong Encryption

By using source-based encryption in all CTERA Cloud Storage Gateways and end-point software Agents, CTERA effectively creates a VPN for cloud storage, in which the customer has full control over who can access and read his files. CTERA uses enterprise-grade AES-256 (Advanced Encryption Standard) encryption for all data sent to the cloud. AES-256 is a highly secure encryption algorithm, approved for protecting U.S. government classified material, and widely used by financial institutions.

Users also have the option of encrypting local volumes on CTERA Cloud Storage Gateways, further protecting their data in case of physical theft of the appliance or its hard drives.

Authentication and Identity Management

CTERA integrates with your existing Active Directory/LDAP services to provide user authentication and single sign-on, including password expiration policies and AD forests support. Active Directory groups can be used to determine user privleges and management roles. A fully documented API is provided for additional custom integration.

For administration access, CTERA Portal supports role-based access permissions, automatic lockout after failed login attempts and IP-based access control.

Private Encryption keys

CTERA Portal allows each user to choose either a private key derived from a personal encryption passphrase, or to accept an automatically generated key. The system administrator has full control over the choices of encryption keys given to users, according to the security policies of the organization. 

Secure Connection

In addition the encrypting the data itself, all cloud traffic is transmitted over a TLS (Transport Level Security) connection, the same kind of connection used for safe transactions on e-commerce sites. TLS protects data from being read or intercepted en route to the online backup infrastructure. CTERA Portal uses X.509 digital certificates to prevent "man in the middle" attacks.

Fingerprinting

CTERA uses SHA-1 (Secure Hash Algorithm) to "fingerprint" the data sent to the cloud. This is a method to ensure data integrity, i.e. that the data set reaching its destination is the same data set transmitted by the user, and that it has not been tampered with.

 

About CTERA

CTERA Networks revolutionizes storage, data protection and collaboration for enterprises and SMBs. Its hybrid architecture combines secure cloud storage services with on-premises appliances and managed agents. CTERA's scalable cloud service delivery platform is used by leading service providers and enterprises, on the public or private cloud infrastructure of their choice.
©2014 CTERA Networks Ltd., All Rights Reserved
Privacy Policy | US: (650) 227-4950 |
Worldwide
  • UK +44-20-3318-0130
  • FR +33-9-75 18 11 89
  • IT +39-02-4792-1184
  • ES +34-91-143-6431
  • AU +61-418-390-354
  • IL +972-3-679-9000