iTernity iCAS

SPACERCompliant Archiving ImageSPACER

DATA ARCHIVING MADE SIMPLE

iCAS is a flexible middleware for retention management & WORM storage. The solution integrates perfectly into existing IT infrastructures. While you take care of your core business, iCAS reliably protects the integrity and availability of your data in the background.

YOUR ADVANTAGES WITH ICAS

Hardware independent: The archive intelligence is tied to the software-layer, not to the hardware

Hardware independent: The archive intelligence is tied to the software-layer, not to the hardware

Compliant: iCAS fulfils regulatory and compliance requirements

Compliant: iCAS fulfils regulatory and compliance requirements

Flexible: Middleware between your business application and the existing storage infrastructure

Flexible: Middleware between your business application and the existing storage infrastructure

Tamper-Proof: iCAS provides WORM storage, encryption and retention management

Tamper-Proof: iCAS provides WORM storage, encryption and retention management

iTernity iCAS and iCAS FS overview

Auditing reliability and compliance for business data

Auditing reliability and compliance for business data

120+ validated business applications (DMS, ECM, ERP, PACS, KIS, Email)

120+ validated business applications (DMS, ECM, ERP, PACS, KIS, Email)

Supporting DAS-, NAS-, SAN-, object- and cloud-storage targets

Supporting DAS-, NAS-, SAN-, object- and cloud-storage targets

Certified for GDPR, GoBD, GeBüV, and SEC 17a-4

Certified for GDPR, GoBD, GeBüV, and SEC 17a-4

Automatic Self-Healing to protect data integrity

Automatic Self-Healing to protect data integrity

Scalable from TB to PB

Scalable from TB to PB

Low overall costs and transparent licensing model

Low overall costs and transparent licensing model

Strong partnerships and available via HPE Complete & GreenLake

Strong partnerships and available via HPE Complete & GreenLake

SOFTWARE-DEFINED & FUTURE-PROOF

iCAS protects data integrity and availability, even if the underlying storage technology and hardware changes in the future. As a software-defined solution, iCAS lays the foundation for audit-proof data archiving and protects your investments in hardware, software, and services.

ARCHITECTURE

ARCHITECTURE

iCAS adapts to your IT infrastructure and adds compliance, data integrity protection, and WORM storage (Write Once Read Many) to your existing systems.

After connecting to your business applications, such as DMS or PACS, the data is written from the application to the iCAS fileshare. iCAS combines the metadata with the archived objects in patented CSCs (Content Storage Containers), which are protected against manipulation and unauthorized deletion.

The CSCs are stored as files on the existing IT infrastructure — whether onsite, cloud or object storage. CSCs can be migrated securely, cost-effectively and without loss, even while running business operations.

WORM STORAGE (WRITE ONCE READ MANY

WORM STORAGE (WRITE ONCE READ MANY

WORM storage represents a special case of archiving, which guarantees the immutability of archive data. Data can only be read and no longer be changed, deleted, or manipulated. WORM storage is legally required in many countries for tax-relevant business documents or certain data in regulated industries (e.g. healthcare, pharmacy, energy supply).

EASY INTEGRATION & INDEPENDENCE

EASY INTEGRATION & INDEPENDENCE

Do you need a flexible, independent and scalable archive? iCAS addresses exactly these needs because the software solution provides the archiving intelligence, not the storage hardware. iCAS connects your business applications (ECM, DMS, ERP, E-Mail, PACS etc.) with the storage infrastructure and is independent of both sides.

The software solution runs on Windows Server and can be implemented on a physical or virtual server. iCAS is based on standard hardware and can be used with on-premises, object or cloud storage solutions (MS Azure Blob Storage direct interface). This allows you to benefit from additional advantages such as easy deployment, maximum scalability, and geo replication.

CERTIFIED SOLUTION

CERTIFIED SOLUTION

iCAS ensures data security and data protection, and has been audited and certified for GDPR, GoBD, and GeBüV compliance by the auditing company KPMG. Furthermore, iCAS has been audited and certified by Cohasset Associates Inc. for compliance with strict U.S. industry requirements such as SEC 17a-4 and CFTC 1.31.

ga('send', 'pageview');