Encryption and data protection.
All data is highly available and resistant to a wide range of infrastructure failures while retaining 11 9’s of durability, subject to automated integrity checks via audits and able to be automatically repaired in the event that some portion of the infrastructure fails or is otherwise compromised.
Data protection is not just about security, it is also about data privacy. One of the key differences of Storj is that we give customers complete control over encryption. Customers have the flexibility and control to generate or provide their own encryption keys. Keys that Storj does not save or have access to. Other cloud providers may be able to access your data.
Identity and access management.
Storj enables access management at the edge and employs capability-based access control. Should the need arise, specific access can be systematically revoked to maintain data security.