We help CIOs and technology leaders with systems architecture, data-centre technology choices, data security, and data management.
Data Security: we offer security consulting, security as a service, DR as a service and breach management as a service.
We offer security consulting, security as a service. DR as a service and breach management as a service
Qi sells state-of-the-art solutions, including enterprise storage and hyper-converged systems.
Qi delivers data management solutions, ranging from data architecture to big data analytics
Qi Video: Terry Swaren on Hybrid Storage using Cloudian
Amazon web services can be addictive. It's easy to start with some applications development work, move on to running prototypes and then find your company in a situation where large production applications are running on Amazon. Costs can quickly spiral out of control, especially if data is flowing between Amazon and your own datacentre. It's also easy to end up in a situation where inappropriate data (e.g. sensitive information or archival data) is sitting out on the cloud.
Cloudian S3 object storage, a software-defined or appliance-based solution solves this problem by allowing you to migrate Amazon S3 storage from the cloud into your on-premises infrastructure or to other cloud providers (e.g. Microsoft Azure or Google Cloud Platform). Cloudian's storage is suitable for a wide number of applications, including big data, Internet of Things, data protection, media and entertainment, and data life-cycle management. Migrating S3 storage from Amazon Web Services to Cloudian storage allows you to drastically reduce costs and increase data security by running data intensive applications in-house.
Qi Video: Candace Ramirez on Hybrid Storage using Pure Storage
Many of our client's have been mandated to adopt a "cloud first" strategy. One of the biggest challenges is the difference between cloud storage APIs and traditional on-prem storage. You may have to re-write parts of your application or leave some of it behind. If you choose the latter, you end up with killer ingress and egress charges.
One of our partners, Pure Storage, has come up with an innovative hybrid cloud strategy that allows legacy apps to access cloud storage through the same API that is used for on-prem storage. You also get the benefit of Pure Storage's data de-duplication and compression algorithms to reduce your cloud footprint and save money in ingress/egress charges.
Qi Video: Allan Kennedy on protecting data with DataStealth
DataStealth is a data protection platform that applies data protection policies to network traffic in real-time, on the fly. This new product fits several common use cases:
Obfuscation of sensitive data in test files and databases
Elimination of sensitive data in unstructured data (e.g. in incoming and outgoing email traffic)
Tokenization of sensitive data when in motion
Compliance with GDPR
From a technical perspective, DataStealth inspects network traffic at the packet level, extracts data that matches your Data Protection Policy, replaces the extracted data with substitutes to be sent downstream, and secures the original data using a unique secure storage methodology.
From a business perspective, DataStealth takes your organizations privacy, compliance, governance and regulatory requirements, and combines them with tokenization, anonymization and encryption technologies to create a Data Protection Policy, which is then applied to all network traffic passing through DataStealth.
The original data elements can be restored at any point in the future, but only for authorized users, and for authorized use cases.
The real data isn't transmitted or stored downstream of DataStealth. In the event of a network breach, there is no sensitive data for an intruder to steal.
Qi Video: David Millier on Breach Readiness
New Canadian privacy breach notification rules, similar to European rules, came into force on November 1, 2018
IS YOUR COMPANY PREPARED?
Do you have a breach identification process in place?
Do you have a breach tracking and recording system in place?
Do you have a breach communication plan in place?