IDAs Slice Data, Boost Network Security

How information dispersal algorithms (IDAs) can be used in storage arrays and to boost network security.

By Enterprise Networking Planet Staff | Posted Mar 29, 2010
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Information dispersal algorithms (IDAs) are used to slice data into pieces at the bit level so that when data traverses the network or sits in storage arrays, it is unrecognizable unless accessed by a user/device with the right key. According to this Search Networking report, IDAs can be used in storage arrays and for data in motion.


"The Unisys Stealth Solution uses a combination of VPN, encryption and data-parsing technology to make data unrecognizable both in storage arrays and as it travels the network. Stealth appliances place proprietary headers on TCP/IP packets, encrypt them and then slice the data. The data can be reassembled only when accessed by a user with the correct key. Unisys' data parsing and authentication technique is implemented between the data link and network layer of OSI stack. Stealth can also be used to store sliced data among differing storage arrays."

Read the Full Story at Search Networking

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter