Eliminate the need to trust the security of your business data in the cloud.
Joyent has partnered with GuardTime to provide its proof-based keyless signature service designed to verify the integrity of your most valuable assets in the cloud: code, logs, storage, and archives. Together, Joyent and GuardTime answer the question: “Why should I trust you with my data?”
GuardTime’s Keyless Signatures provide proof of signing authority, signing time, and integrity of all data items located in the cloud. The signature never expires and its verification is based solely on mathematics, eliminating the need for secret keys.
The service is deployed in two parts. The GuardTime image requests signatures for each software file, log file, and any other data file. The GuardTime Global Service then issues the unique signature which is stored alongside the data within the provisioned Joyent cloud. When instructed to do so, the GuardTime image would request that the signature be validated by the GuardTime Global Service, confirming that the data items being checked remain intact.
With the GuardTime images, Joyent customers will be able to:
Why is GuardTime’s approach a better security model for the cloud? It comes down toproof vs trust. Is your cloud security model based on trust -or- is it based on a mechanism that proves your data is intact?
To learn more about how could eliminate the need to blindly trust your data in the cloud, contact us and we will be happy to get you started with your own GuardTime image.