As a leading data storage company, Seagate produces enterprise-grade hard drives and storage solutions. We have partnered with a decentralized storage network to provide individuals and businesses with secure and reliable storage solutions. Through this partnership, we integrate our data management services with the decentralized network, allowing users to manage their data more effectively and securely.
AMD
Through our partnership with AMD, we utilize their high-performance processors, such as the AMD Ryzen™ Threadripper™ and AMD EPYC™, to power our network and optimize data storage and retrieval. With this partnership, we aim to provide individuals and businesses with reliable and efficient storage solutions, while promoting the growth and development of the decentralized storage ecosystem.
Eagle Trading
As a decentralized storage provider, we've partnered with Eagle Trading, an import and export company building an e-commerce platform, to offer reliable and secure storage solutions. Our decentralized storage technology allows Eagle Trading to store and manage their data more efficiently and cost-effectively, while benefiting from our high performance and decentralized architecture. Through our partnership, we're enabling Eagle Trading to build a more resilient e-commerce platform and promoting the adoption of decentralized storage solutions.
Deep Data Storage
Store and access your archive data in milliseconds at a lower cost.
Connectivity
Single Destination for Trusted and Connected Enterprise Data.
Decentralization
Multi-Tenant Platform, no need for a centralized data lake infrastructure.
Simplicity
Rapid data and metadata ingestion, without needing to provision, manage, and scale data pipelines.
Compliance & Security
Data Management, Governance, Audit, and Security Services.
FAQs
Don’t leave with any doubt.
How is the data stored?
Data is stored in 32GiB or 64 GiB encoded sectors.
Where is the data located, are there regions?
Data is located at Storage Provider data centers, based on customer requirements/selection.
How can I control access to my data stored?
DLT data access has limited options (a dedicated machine can disable retrievals, but by adding encryption to the data files, customers can control access by managing encryption keys.
Is data access auditing supported?
Local logs are available for data access upon request.
How secure is customer data in Medula?
Medula data center facilities are fully secured, access controls and other security mechanisms such as sharding are optional on a per customer basis.
Is Medula compliant with PCI, CCPA, GDPR, SOC2 etc
Medula is in the process of obtaining SOC2 Type II audit and HIPAA certification. Other certifications may be obtained with customer requirements.
How is the data secured (at-rest, in-motion)?
Data at rest may be encrypted as an option, including an option for whole disk encryption. Data transmitted over a network is encrypted with TLS 1.2 or as determined by a customer.
How is it integrated with existing hot storage cloud offering and on-premises?
See Medula basket diagram.
What is the durability of this solution?
Medula recommends multiple replicas in different geographic regions based on customer needs. Daily audits of sectors reveal any data corruption, allowing us to replace any bad sectors with good replicas as needed.
Is there a charge for retrieving the data?
Depends on customer agreement.
What use cases is this product not a good fit for?
DLT storage is ideally suited today to cold archive storage.Optional cloud storage (basket) allows for warm retrievals.
Got Data? Let’s talk
Store and secure your Data on Medula’s Distributed Ledger and simply sit back.