Let's imagine that we have a hard-disk problem and our work computer with some tasks dating for a few years in the past won't start. Nobody can recover the data from the disk. What is going to happen in this case?

Unfortunately, this is not a scenario from an american thriller, but real and extremely frequent cases. According to Google specialists, 1,7% hard-disks deteriorate in the first usage year and the percentage raises to an alarming 8,6% by the third year. The researchers from the well-known american University, Carnegie Mellon appreciate that the frequency of deterioration is between 2% and 4%, on some of the systems reaching even 13%.

ZDNet estimates that the companies lose around 200 bilion dollars because of the virus attacks. According to Connected Corporation, 69% from the respondents say that the viruses damaged the productivity from a financial perspective and 37% lost data for the same reason.

As a conclusion, the reasons for that everyone needs to archive their data are:

  • Equipment flaws (especially stocking devies: hard-disks etc.)
  • Virus attacks
  • Equipment theft (computers)
  • Data and information theft
  • Natural disasters (fire, flood, earthquake)
  • Wars

IT experts recommend that archiving is done on a server (not on the work-station), and if possible on another computer located somewhere else.

What is Isidoria?

Isidoria is a software application made to prevent all the dangers mentioned above. More speciffic, it's an archiving and stocking system which works on each computer and periodicly saves all information on a server (safe device).

Data is crypted (so no one can access them, except yourself), and just in care you can use the previously saved files. This system saves time and your data, and offers the possibility to recover every work station, even if you erase all data and install a fresh copy of operating system, because all your work is saved on the server and you can recover it from there.

All the data stocked in that safe device are crypted on a high level of security, so if someone in some weird case would copy the data unlawfully, he won't be able to view, change or decrypt them no matter what.

Isidoria system's advantages

  • possibility of data stocking on monitorised computers without needing to print these on optical drives (CD, DVD), stocking devices (Flash memory, floppy, etc), devices that don't ensure one that the data is safe, that can be copied, transmited or stolen.
  • crypted and secure stocked data - it's automatically done by the stocking device, all of them being crypted at a hight level of security; copying or stealing these being in vain because of the impossibility of viewing, editing, extracting or manipulating. All stocked data can only be used by entrusted individuals for decrypting and transmiting them further.
  • the access to stocked data is only done with the authorized permission of the assigned person using a control and access password.
  • elimination of the effective costs for burning and saving data on classic stocking devices, and labor costs of someone who would be entitled to manually secure the data.
  • the stocking space is thousands greater than the space on classic devices, and it can be enlarged if needed.
  • all data access or authorized removal is monitored and it can be easily hightlighted when, who and what data has been extracted using a password, which eliminates by default the data manipulation or transmission for own causes by the institution's staff or in order to extract and transmit further commiting a fraud.
  • possibility of recrypting - or posibility of changing the password used for authorized access to stocked data and frequently changing it (defined through time gaps decided by the institution's administration) and changing the password carrier.
  • data reinsurance - defined by copying and stocking all already crypted data and frequently secured (ex: 3 months or 6 months or 1 year), in order to reinsure them. This function eliminates the possibility of destroying this data because of some external factors with targeted intention (willingly destroying the stocking and securing device by direct human action) or external factors with potential risk (fire, earthquake, etc.) which can have a physical impact directly on the functionality of the security and stocking device.
  • the application is independent from the platform - which means that it works on any operating system, on one side, and all data is accessible from any computer.