{"id":387651,"date":"2022-07-26T16:00:00","date_gmt":"2022-07-26T14:00:00","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=387651"},"modified":"2022-07-26T16:00:00","modified_gmt":"2022-07-26T14:00:00","slug":"bluetrons-new-data-security-service-mixes-new-and-old-approaches-to-file-storage","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/bluetrons-new-data-security-service-mixes-new-and-old-approaches-to-file-storage\/","title":{"rendered":"Bluetron&#8217;s new data security service mixes new and old approaches to file storage"},"content":{"rendered":"\n<p>The growing risk of cyber attacks has left companies big and small seeking out new ways to protect themselves and the data of customers. With bolder attacks and big ransom amounts being demanded by hackers, solving the problem now appears non-negotiable. <\/p>\n\n\n\n<p>Dutch data and security services company <a href=\"https:\/\/www.bluetron.nl\/#:~:text=100%25%20Data%20Guarantee%20to%20ensure,cooperation%20with%20Fujifilm%20and%20IBM.\" target=\"_blank\" rel=\"noreferrer noopener\">Bluetron<\/a> has partnered with industry heavyweights IBM and Fujifilm to develop <a href=\"https:\/\/www.bluetron-dataservices.nl\/\" target=\"_blank\" rel=\"noreferrer noopener\">100% Data Guarantee<\/a> \u2013 a data security product that relies heavily on regular scanning of longitudinal company data to keep company data secure in both digital and physical formats.\u00a0<\/p>\n\n\n\n<p>Launched just this month, it\u2019s a new venture for the Veenendaal-based company with around 50 employees. Up to this point, Bluetron\u2019s main services were high tech ICT systems and data centres.&nbsp;<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link advgb-dyn-ed363f6a\"><a href=\"https:\/\/ioplus.nl\/archive\/en\/how-doctors-and-scientists-can-share-healthcare-data-quickly-and-securely\/\" class=\"vlp-link\" title=\"How doctors and scientists can share healthcare data quickly and securely\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">How doctors and scientists can share healthcare data quickly and securely<\/div><div class=\"vlp-block-1 vlp-link-summary\">The first regionally scalable version of the e\/MTIC Health Data Portal is planned for next year in the Netherlands. <\/div><\/div><\/div>\n\n\n<p>Bluetron\u2019s marketing manager Carlo van Pelt and business consultant Edwin Theunisse spoke to Innovation Origins for this installment of the series <a href=\"https:\/\/innovationorigins.com\/en\/tag\/start-up-of-the-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">start-up of the day<\/a> about 100% Data Guarantee\u2019s advantages for an increasingly hostile data environment for businesses operating online.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is 100% Data Guarantee all about?<\/h2>\n\n\n\n<p>Carlo van Pelt (CvP): \u201cOur product delivers a quick start-up of a company after a ransomware attack, with all its recent data. We take care of the storage of all data and make sure to scan it for the latest virus definitions. This is done during storage, when it comes in and when it is retrieved.&nbsp;<\/p>\n\n\n\n<p>\u201cIf you go into a normal back-up system, they usually have a retention time of around 60-90 days because they are used to taking a snapshots of the system. However, ransomware can remain available in the system for 3-9 months. So it&#8217;s possible that some people have their backups arranged online but their backups are already infected.<\/p>\n\n\n\n<p>\u201cAs the data comes in, we scan it, when we find nothing it goes directly into our archives. We are constantly checking if there are new virus definitions, and if there are, we bring the data from the tape to a safe environment to check that we didn&#8217;t miss anything the first time it was scanned.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What environment does 100% Data Guarantee emerge within?<\/h2>\n\n\n\n<p>CvP: \u201cWe were seeing ransomware attacks happening daily and that a lot of companies were vulnerable, despite already investing in all sorts of systems to protect themselves. Big companies are being attacked successfully by hackers \u2013 there is no doubt about it.&nbsp;<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link\"><a href=\"https:\/\/ioplus.nl\/archive\/en\/selected\/ai-model-diagnoses-covid-19-preserving-the-privacy-of-patient-data\/\" class=\"vlp-link\" title=\"AI model diagnoses COVID-19 preserving the privacy of patient data\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><img loading=\"lazy\" decoding=\"async\" style=\"max-width: 150px;\" width=\"150\" height=\"97\" src=\"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1.jpg\" class=\"attachment-150x999 size-150x999\" alt=\"\" srcset=\"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1.jpg 1920w, https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1-300x193.jpg 300w, https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1-1024x660.jpg 1024w, https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1-768x495.jpg 768w, https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/04\/OsHCaWGY-coronavirus-disease-covid-2019-g0de88c81a_1920-1-1536x990.jpg 1536w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">AI model diagnoses COVID-19 preserving the privacy of patient data<\/div><div class=\"vlp-block-1 vlp-link-summary\">Researchers in the UK and China have developed an artificial intelligence (AI) model that can diagnose COVID-19 as well as a panel of professional radiologists.<\/div><\/div><\/div>\n\n\n<p>\u201cThey are then in deep trouble because they have to pay ransomware and might be out of business for a long time. In numerous cases where they pay ransomware, it&#8217;s not certain that they can get all the data back and that it is a format that they can immediately use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the real advantages of this system?<\/h2>\n\n\n\n<p>Edwin Theunisse (ET): \u201cOne of the key things we do is that when we give back data to customers, including process data and machine data, we also let them know what to do to further protect themselves. The systems are then ready for a new set of data. We can then make the company operational again in a few days, depending on how complex it is.&nbsp;<\/p>\n\n\n\n<p>\u201cWe use tapes, which can create these &#8220;air gaps&#8221; where data isn&#8217;t reachable for hackers. It&#8217;s a very green solution, especially since there is often so much talk about power slurping data centers. While people think it\u2019s old-fashioned, tape storage is 60% more efficient as a form of digital storage. The latest linear tape-open drives (LTO) can put in 19 TB of data on one tape, the equivalent of 6000 full length movies.\u201d&nbsp;<\/p>\n\n\n\n<p>CvP: \u201cThe overall advantage is that 100% Data Guaratee scans data as it comes in and where it is stored, making sure it is tracking the latest virus definitions. This makes it really unlikely a virus will not be detected.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do you work with customers?<\/h2>\n\n\n\n<p>CvP: \u201cOur first step is to make a current inventory of the data that a customer might have. The next step is that the data package then will be sent to Fujifilm, who put a copy on tape \u2013 in addition to our copy at Bluetron. As an object file, the data is then sent to Fujifilm in Germany. \u201cThey do a scan to see if they have received everything, based on what the customer wants to give. Then it is off to store a copy in their offline data center. A third copy is also then made, which is sent to a bunker somewhere in Europe \u2013 acting as a true last line of defense for companies in case of floods, fires or other disasters.&nbsp;<\/p>\n\n\n\n<p>\u201cThe transport from Fujifilm premises to the bunker is also secure. It can&#8217;t even be tracked.\u201d<\/p>\n\n\n\n<p>ET: \u201cAfter this initial process, we install a data mover on the customer side. This picks up only the new data. The systems finds something in the latest version and then automatically gets checked for the customer in earlier versions.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does 100% Data Guarantee stand apart from traditional backup services?<\/h2>\n\n\n\n<p>ET: \u201cWe make the difference between backup and disaster recovery. You use us for disaster recovery. For situations where you can&#8217;t have your data unless you pay \u20ac1 million to get it back. In this case, by using us you get your data back in 1-3 days.&nbsp;<\/p>\n\n\n\n<p>\u201cIn some of the recent examples of ransomware attacks that are known, the backup systems were not functioning. Hackers now know that if they really want to have the money, they also need to block the backup. As long as you&#8217;re backup system has an online connection, then it remains vulnerable.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s the next step for your product?<\/h2>\n\n\n\n<p>ET: \u201cOur next priority is to protect extremely sensitive information when hackers spend too long in the system. They might look for something that might be damaging for the company if it gets in the news, such as IP data. <\/p>\n\n\n\n<p>CvP: \u201cSo we have to ask companies if it matters that they hold onto this data right now or whether it can be stored in a back area. The idea, more or less, is that the customer transfers all their files from their systems to our systems.&nbsp;<\/p>\n\n\n\n<p>\u201cFrom then, it takes around 5 minutes for the customer to extract their data from our system. It is a small price to pay to ensure data doesn&#8217;t end up on the street anywhere. It also works with a secured internet connection, so it can require years to hack into.\u201d<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link\"><a href=\"https:\/\/innovationorigins.com\/en\/tag\/start-up-of-the-day\/\" class=\"vlp-link\" title=\"Start-up of the day archives - Innovation Origins\" rel=\"nofollow\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">Start-up of the day archives &#8211; Innovation Origins<\/div><div class=\"vlp-block-1 vlp-link-summary\">Spread all over Europe, thousands of start-ups have the most innovative ideas. Innovation Origins puts them in the spotlight every day.<\/div><\/div><\/div>\n\n\n<p>Foto: Edwin Theunisse and colleagues. \u00a9 Bluetron.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The growing risk of cyber attacks has left companies big and small seeking out new ways to protect themselves and the data of customers. With bolder attacks and big ransom amounts being demanded by hackers, solving the problem now appears non-negotiable. Dutch data and security services company Bluetron has partnered with industry heavyweights IBM and [&hellip;]<\/p>\n","protected":false},"author":2497,"featured_media":516650,"comment_status":"open","ping_status":"closed","sticky":false,"template":"views\/single-startup.blade.php","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[3009],"tags":[28925,8192,45262,35348],"location":[6763],"article_type":[6758],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[],"class_list":["post-387651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-startup","tag-cybersecurity-en","tag-data-en","tag-hack-nl","tag-start-up-of-the-day","location-netherlands","article_type-interview"],"blocksy_meta":[],"acf":{"subtitle":"Every day we put a different start-up in the spotlight. Today: Bluetron","text_display_homepage":false},"author_meta":{"display_name":"Pierre Felcenloben","author_link":"https:\/\/ioplus.nl\/archive\/author\/p-felcenlobeninnovationorigins-com\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2022\/07\/121079-484.jpg","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/startup\/\" class=\"advgb-post-tax-term\">Start-ups<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Start-ups<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/startup\/\" class=\"advgb-post-tax-term\">cybersecurity<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/startup\/\" class=\"advgb-post-tax-term\">data<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/startup\/\" class=\"advgb-post-tax-term\">hack<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/startup\/\" class=\"advgb-post-tax-term\">Start-up of the day<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cybersecurity<\/span>","<span class=\"advgb-post-tax-term\">data<\/span>","<span class=\"advgb-post-tax-term\">hack<\/span>","<span class=\"advgb-post-tax-term\">Start-up of the day<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 4 years ago","modified":"Updated 4 years ago"},"absolute_dates":{"created":"Posted on July 26, 2022","modified":"Updated on July 26, 2022"},"absolute_dates_time":{"created":"Posted on July 26, 2022 4:00 pm","modified":"Updated on July 26, 2022 4:00 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/387651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/2497"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=387651"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/387651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/516650"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=387651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=387651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=387651"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=387651"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=387651"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=387651"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=387651"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=387651"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=387651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}