QSAN builds security-first storage which offers you full protection for your data. QSM protects the system from hacking, and interception of data, theft, data corruption, and accidental deletion.
Facing Modern Security Threats Proactively
QSM secures your current data by delivers an actionable, proactive protection strategy to minimize potential risks.
Write Once Read Many (WORM)
Files and folders under WORM’s protection can only be read in a user-defined period. WORM it can protect your data from encryption-based ransomware that installs covertly on a victim’s system and encrypt their files, making them inaccessible. WORM can also protect your confidential data from unauthorized modification and threat, ensuring the correctness and integrity of your data.
Self-Encrypting Drive (SED)
QSM can be much safer more than you can imagine with the disk self-encrypting technology called SED (Self-Encrypting Drive). With the technology, even if the physical drive is stolen or misplaced, the data on it remains protected against data breach by generating the authentication key (AK) to prevent the unauthorized access. However, the SED offered by QSAN provides the secured pools migration between different unified storage and easy to manage the key by exporting AK for more efficient.
Pool Encryption with AES-256
QSM pool encryption mechanism ensures secured storage environment any user who wants to modify data must first pass authentication. QSM supports up to AES 256-bit encryption for internal drives and external USB/eSATA drives, and adopts a military level FIPS 140-2 validated encryption, which is considered to be the highest security certification for compliance.
Service Binding
Service binding enhances system security by letting administrators determine which services can be connected through which network interfaces. The security of sensitive applications as well as bandwidths of critical services are firmly protected.
Memory Cache Protection
In the event of power loss, the I/O cache data stored in volatile memory will be lost. Memory Cache Protection function that will safely transfer the memory cache data to a non-volatile flash device when a unexpected power loss happens, your data will be safely saved for permanent preservation.
Facing Modern Security Threats Proactively
QSM secures your current data by delivers an actionable, proactive protection strategy to minimize potential risks.
Antivirus
The built-in antivirus function periodically scans files automatically quarantining suspicious files to protect the system from potential threats.
Internet SSL
SSL certificates deliver secured tunnels for data transmission ensuring that critical data and information cannot be intercepted or modified during the transfer process.
Stay Away from Data Corruption and Silent Corruption
Every bits counts! Data can be transferred, modified and updated multiple times. The problem will show up when unintentional changes or the deletion of parts of data may cause data/silent corruption. QSM is a ZFS based operation system which provides ZFS checksum and Copy on Write technology to keep data complete.
Prevent Silent Corruption – ZFS checksum
Silent corruption errors are caused by hardware, driver, or file system metadata errors, and further which the software system can’t detect. But in ZFS, all access operations include a Checksum mechanism, and when a data is read, ZFS will calculate the checksum and compare with the original checksum, if not match, it automatically repairs the damage, using data from the other mirror to ensure the correctness of the data.
Safeguard From Data Corruption - Copy on Write
Data corruption refers to errors in data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. In ZFS The data changes are stored on a different location on a disk and then the metadata is updated in that place on the disk. This mechanism guarantees that the old data is safely preserved in case of power loss or system crash that in other cases would result in loss of data.
Comprehensive Business backup function Advanced Enterprise Feature
QSM server cover local and remote snapshots scheduled, giving you the flexibility and confidence to work worry-free. Also provides synchronous multi-site data replication to make sure business continuity.
XMirror
Regularly synchronizes a volume, or the contents of a folder between multiple unified storage devices.
Snapshots record the status of shared folders and iSCSI LUNs as changes happen on write, and replication can transfer the changes between different device.
Remote Replication
Remote Backup Data copies can be distributed to your trusted storage locations through real-time remote backup.
XReplicator
XReplicator is a free utility that is provided to help you easily backup an image of a disk, partition, folder or file. XReplicator is also able to back up an entire PC to the XCubeNAS as a bare metal backup.
QSM provides cloud services backup ensures that you can backup your data to multiple cloud services such as, Amazon S3, HiCloud S3 cloud, and S3 compliant services.
Enlarge storage capacity
QSM server cover local and remote snapshots scheduled, giving you the flexibility and confidence to work worry-free. Also provides synchronous multi-site data replication to make sure business continuity.
Inline Deduplication
Block-level function that checks the block similarity of data and auto remove of the redundant data object to reduce the usage of storage capacity.