SlideShare a Scribd company logo
1 of 1
Download to read offline
“Horatio Private Secure Cloud”




The IT investment estimates for medium and large Italian companies for 2012, in the infrastructure field, are focused on security, business
continuity and disaster recovery. This appears from the data of the latest Cio Survey carried out by NetConsulting. Another, more detailed
report, prepared by Nextvalue and consisting of the Information Security Management theme, pointed out that most of the large Italian
companies today consider very critical and significant the impact of the security solutions on business processes concerning the budget
allocated to this segment and which currently cover only 5% of that intended for the whole computer process.
Source: Corriere delle comunicazioni (Courier Communications) (link: http://www.corrierecomunicazioni.it/it-world/12481_cloud-i-guasti-
informatici-prima-causa-di-perdita-di-dati.htm )


Description of the infrastructure
 esc
DSS has two server farms dedicated to Horatio, the Private Secure Backup Cloud service located in highly strategic
geographical areas, in order to ensure continuity of the supplied services. The data centers that house the two server farms
are certified facilities which make use of technological systems designed and manufactured in order to drastically reduce
energy consumption compared to equivalent traditional systems and, consequently, to contain considerably the CO2
emissions significantly.

Horatio Data Protection System

Horatio Private Secure Cloud is a remote data protection service that allows backup and data restoring through a
                        Cloud
dedicated application software and a specific web application.

Horatio uses a dedicated algorithm operating on the HTTP Protocol with SSL encryption in order to ensure the transferring
of the data from the source to be protected to the archiving-dedicated structure in an efficient and safe way.

The use of this methodology allows HORATIO to be a firewall friendly solution; i.e. the service does not require any
dedicated devices to cross the firewalling barriers as the standard internet communication channel is used.

Horatio makes efficient use of the internet bandwidth used for the backup process through the use of data compression
combined with the deduplication incremental mechanism and ensures data security through a 256-bit AES encryption.
Horatio exploits the versioning system of the files in such a way as to maintain, according to a predetermined retention,
multiple versions of the same protected file.

Horatio is a multi-platform solution and can work on multiple operating systems found on the market today.
The service aims at supporting the client in maintaining continuity of business operations, giving them the tools they need
to perform on a daily basis and in a totally automated way, the electronic transfer and remote storage of data to be saved,
directly from the Server and from the PC to a safe backup infrastructure cloud.

Thus, the service allows:
- the use of the filing infrastructure, software, management and monitoring system that enable the supplying and
implementation of the Service;
- to keep the different versions of the files selected for the backup;
- to restore the data when requested.




                      Data Storage Security s.r.l società unipersonale - Cod. Fisc./P.IVA 01548880333 - Cap. Soc. €.100.000 i.v.
                    Sede Legale:            PIACENZA Via Poggiali, 43 - 29121 Piacenza (PC) Tel. (+39) 0523.33.46.40 Fax (+39) 0523.32.88.31
                    Sedi Operative:         FIDENZA       Via La Bionda 16 - 43036 Fidenza (PR) Tel. (+39) 0524.52.35.21 Fax (+39) 0524.81.994
                                            FICULLE       Loc. San Lazzaro, 2 - 05016 Ficulle (TR)
                    Sito: www.dssecurity.it Email: gestione@dssecurity.it

More Related Content

What's hot

Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for TitusSeclore
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | SecloreSeclore
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security Seclore
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreSeclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - SecloreSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Seclore
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionMichelle Guerrero Montalvo
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matterExove
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecuritySeclore
 

What's hot (20)

Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for Titus
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - Seclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 
Data Security
Data SecurityData Security
Data Security
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
GDPR and technology - details matter
GDPR and technology - details matterGDPR and technology - details matter
GDPR and technology - details matter
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 

Viewers also liked

Comp tia a+ ce certificate
Comp tia a+ ce certificateComp tia a+ ce certificate
Comp tia a+ ce certificatebasrawi
 
Presentacion
PresentacionPresentacion
Presentacionefraile
 
Autism leafle-awareness-fr
Autism leafle-awareness-frAutism leafle-awareness-fr
Autism leafle-awareness-frMarta Montoro
 
Objetivos de la intervención
Objetivos de la intervenciónObjetivos de la intervención
Objetivos de la intervenciónPedro L.F.
 
Thomas R Beck resume final
Thomas R Beck resume finalThomas R Beck resume final
Thomas R Beck resume finalThomas Beck
 
Fox brains consultants (3)
Fox brains consultants (3)Fox brains consultants (3)
Fox brains consultants (3)foxbrains3
 
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSelling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSri Harsha Govardhana
 
Normativa+del+producto
Normativa+del+productoNormativa+del+producto
Normativa+del+productoJuan Pablo
 

Viewers also liked (15)

Catalogo mitica 3
Catalogo mitica 3 Catalogo mitica 3
Catalogo mitica 3
 
Challenge kanban
Challenge kanbanChallenge kanban
Challenge kanban
 
1 9 488
1 9 4881 9 488
1 9 488
 
Comp tia a+ ce certificate
Comp tia a+ ce certificateComp tia a+ ce certificate
Comp tia a+ ce certificate
 
Presentacion
PresentacionPresentacion
Presentacion
 
Autism leafle-awareness-fr
Autism leafle-awareness-frAutism leafle-awareness-fr
Autism leafle-awareness-fr
 
Srm ppt
Srm pptSrm ppt
Srm ppt
 
Producto
ProductoProducto
Producto
 
Kasvatus kannattaa juliste
Kasvatus kannattaa julisteKasvatus kannattaa juliste
Kasvatus kannattaa juliste
 
Objetivos de la intervención
Objetivos de la intervenciónObjetivos de la intervención
Objetivos de la intervención
 
Thomas R Beck resume final
Thomas R Beck resume finalThomas R Beck resume final
Thomas R Beck resume final
 
Fox brains consultants (3)
Fox brains consultants (3)Fox brains consultants (3)
Fox brains consultants (3)
 
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at HyderabadSelling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
Selling To Win Using MBTI Workshop May 18, 2012 at Hyderabad
 
Lunes
LunesLunes
Lunes
 
Normativa+del+producto
Normativa+del+productoNormativa+del+producto
Normativa+del+producto
 

Similar to Slideshare horatio eng

IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionDaniel Sapir
 
20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICTRedit
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTRedit
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICTRedit
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
 

Similar to Slideshare horatio eng (20)

DSS Horatio Secure Cloud
DSS Horatio Secure Cloud DSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
IoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final VersionIoTconnect Data Sheet Final Version
IoTconnect Data Sheet Final Version
 
20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT20141111_MARKET PLACE_Catalogue_ICT
20141111_MARKET PLACE_Catalogue_ICT
 
DSS HORATIO SECURE CLOUD
DSS HORATIO SECURE CLOUDDSS HORATIO SECURE CLOUD
DSS HORATIO SECURE CLOUD
 
MARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICTMARKET PLACE_Catalogue_ICT
MARKET PLACE_Catalogue_ICT
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT20140130_MARKET PLACE_CATALOGUE_ICT
20140130_MARKET PLACE_CATALOGUE_ICT
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Security PFE
Security PFESecurity PFE
Security PFE
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 

More from Data Storage Security S.r.l. (11)

DSS Horatio Secure Cloud
DSS Horatio Secure CloudDSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
DSS Horatio Secure Cloud Backup
DSS Horatio Secure Cloud BackupDSS Horatio Secure Cloud Backup
DSS Horatio Secure Cloud Backup
 
DSS Horatio Secure Cloud Plus
DSS Horatio Secure Cloud PlusDSS Horatio Secure Cloud Plus
DSS Horatio Secure Cloud Plus
 
DSS Horatio Secure Cloud Drive
DSS Horatio Secure Cloud DriveDSS Horatio Secure Cloud Drive
DSS Horatio Secure Cloud Drive
 
DSS Horatio Secure Cloud
DSS Horatio Secure CloudDSS Horatio Secure Cloud
DSS Horatio Secure Cloud
 
DSS Media Off Site Storage
DSS Media Off Site StorageDSS Media Off Site Storage
DSS Media Off Site Storage
 
Brochure Horatio Secure Cloud
Brochure Horatio Secure CloudBrochure Horatio Secure Cloud
Brochure Horatio Secure Cloud
 
Slideshare archivio cartaceo eng
Slideshare  archivio cartaceo engSlideshare  archivio cartaceo eng
Slideshare archivio cartaceo eng
 
Slideshare archivio cartaceo it
Slideshare  archivio cartaceo itSlideshare  archivio cartaceo it
Slideshare archivio cartaceo it
 
Slideshare horatio it
Slideshare  horatio itSlideshare  horatio it
Slideshare horatio it
 
Slideshare oss 2012
Slideshare oss 2012Slideshare oss 2012
Slideshare oss 2012
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Slideshare horatio eng

  • 1. “Horatio Private Secure Cloud” The IT investment estimates for medium and large Italian companies for 2012, in the infrastructure field, are focused on security, business continuity and disaster recovery. This appears from the data of the latest Cio Survey carried out by NetConsulting. Another, more detailed report, prepared by Nextvalue and consisting of the Information Security Management theme, pointed out that most of the large Italian companies today consider very critical and significant the impact of the security solutions on business processes concerning the budget allocated to this segment and which currently cover only 5% of that intended for the whole computer process. Source: Corriere delle comunicazioni (Courier Communications) (link: http://www.corrierecomunicazioni.it/it-world/12481_cloud-i-guasti- informatici-prima-causa-di-perdita-di-dati.htm ) Description of the infrastructure esc DSS has two server farms dedicated to Horatio, the Private Secure Backup Cloud service located in highly strategic geographical areas, in order to ensure continuity of the supplied services. The data centers that house the two server farms are certified facilities which make use of technological systems designed and manufactured in order to drastically reduce energy consumption compared to equivalent traditional systems and, consequently, to contain considerably the CO2 emissions significantly. Horatio Data Protection System Horatio Private Secure Cloud is a remote data protection service that allows backup and data restoring through a Cloud dedicated application software and a specific web application. Horatio uses a dedicated algorithm operating on the HTTP Protocol with SSL encryption in order to ensure the transferring of the data from the source to be protected to the archiving-dedicated structure in an efficient and safe way. The use of this methodology allows HORATIO to be a firewall friendly solution; i.e. the service does not require any dedicated devices to cross the firewalling barriers as the standard internet communication channel is used. Horatio makes efficient use of the internet bandwidth used for the backup process through the use of data compression combined with the deduplication incremental mechanism and ensures data security through a 256-bit AES encryption. Horatio exploits the versioning system of the files in such a way as to maintain, according to a predetermined retention, multiple versions of the same protected file. Horatio is a multi-platform solution and can work on multiple operating systems found on the market today. The service aims at supporting the client in maintaining continuity of business operations, giving them the tools they need to perform on a daily basis and in a totally automated way, the electronic transfer and remote storage of data to be saved, directly from the Server and from the PC to a safe backup infrastructure cloud. Thus, the service allows: - the use of the filing infrastructure, software, management and monitoring system that enable the supplying and implementation of the Service; - to keep the different versions of the files selected for the backup; - to restore the data when requested. Data Storage Security s.r.l società unipersonale - Cod. Fisc./P.IVA 01548880333 - Cap. Soc. €.100.000 i.v. Sede Legale: PIACENZA Via Poggiali, 43 - 29121 Piacenza (PC) Tel. (+39) 0523.33.46.40 Fax (+39) 0523.32.88.31 Sedi Operative: FIDENZA Via La Bionda 16 - 43036 Fidenza (PR) Tel. (+39) 0524.52.35.21 Fax (+39) 0524.81.994 FICULLE Loc. San Lazzaro, 2 - 05016 Ficulle (TR) Sito: www.dssecurity.it Email: gestione@dssecurity.it