Store Data Safely and Completely

QSAN builds security-first storage which offers you full protection for your data. QSM protects the system from hacking, and interception of data, theft, data corruption, and accidental deletion.

Facing Modern Security Threats Proactively

QSM secures your current data by delivers an actionable, proactive protection strategy to minimize potential risks.

Write Once Read Many (WORM)

Files and folders under WORM’s protection can only be read in a user-defined period. WORM it can protect your data from encryption-based ransomware that installs covertly on a victim’s system and encrypt their files, making them inaccessible. WORM can also protect your confidential data from unauthorized modification and threat, ensuring the correctness and integrity of your data.

Write Once Read Many (WORM) Protection
SED Encryption Pool
Self-Encrypting Drive (SED)

QSM can be much safer more than you can imagine with the disk self-encrypting technology called SED (Self-Encrypting Drive). With the technology, even if the physical drive is stolen or misplaced, the data on it remains protected against data breach by generating the authentication key (AK) to prevent the unauthorized access. However, the SED offered by QSAN provides the secured pools migration between different unified storage and easy to manage the key by exporting AK for more efficient.

Pool Encryption with AES-256

QSM pool encryption mechanism ensures secured storage environment any user who wants to modify data must first pass authentication. QSM supports up to AES 256-bit encryption for internal drives and external USB/eSATA drives, and adopts a military level FIPS 140-2 validated encryption, which is considered to be the highest security certification for compliance.

AES-256 Protection Pool Encryption
Service Binding

Service binding enhances system security by letting administrators determine which services can be connected through which network interfaces. The security of sensitive applications as well as bandwidths of critical services are firmly protected.

Memory Cache Protection

In the event of power loss, the I/O cache data stored in volatile memory will be lost. Memory Cache Protection function that will safely transfer the memory cache data to a non-volatile flash device when a unexpected power loss happens, your data will be safely saved for permanent preservation.

Facing Modern Security Threats Proactively

QSM secures your current data by delivers an actionable, proactive protection strategy to minimize potential risks.

Antivirus

The built-in antivirus function periodically scans files automatically quarantining suspicious files to protect the system from potential threats.

Internet SSL

SSL certificates deliver secured tunnels for data transmission ensuring that critical data and information cannot be intercepted or modified during the transfer process.

Stay Away from Data Corruption and Silent Corruption

Every bits counts! Data can be transferred, modified and updated multiple times. The problem will show up when unintentional changes or the deletion of parts of data may cause data/silent corruption. QSM is a ZFS based operation system which provides ZFS checksum and Copy on Write technology to keep data complete.

Prevent Silent Corruption – ZFS checksum

Silent corruption errors are caused by hardware, driver, or file system metadata errors, and further which the software system can’t detect. But in ZFS, all access operations include a Checksum mechanism, and when a data is read, ZFS will calculate the checksum and compare with the original checksum, if not match, it automatically repairs the damage, using data from the other mirror to ensure the correctness of the data.

Safeguard From Data Corruption - Copy on Write

Data corruption refers to errors in data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. In ZFS The data changes are stored on a different location on a disk and then the metadata is updated in that place on the disk. This mechanism guarantees that the old data is safely preserved in case of power loss or system crash that in other cases would result in loss of data. 

Comprehensive Business backup function Advanced Enterprise Feature

QSM server cover local and remote snapshots scheduled, giving you the flexibility and confidence to work worry-free. Also provides synchronous multi-site data replication to make sure business continuity.

XMirror

Regularly synchronizes a volume, or the contents of a folder between multiple unified storage devices.

Learn More
Snapshot & Replica

Snapshots record the status of shared folders and iSCSI LUNs as changes happen on write, and replication can transfer the changes between different device.

Remote Replication

Remote Backup Data copies can be distributed to your trusted storage locations through real-time remote backup.

XReplicator

XReplicator is a free utility that is provided to help you easily backup an image of a disk, partition, folder or file. XReplicator is also able to back up an entire PC to the XCubeNAS as a bare metal backup.

Learn More
Cloud backup & S3

QSM provides cloud services backup ensures that you can backup your data to multiple cloud services such as, Amazon S3, HiCloud S3 cloud, and S3 compliant services.

Enlarge storage capacity

QSM server cover local and remote snapshots scheduled, giving you the flexibility and confidence to work worry-free. Also provides synchronous multi-site data replication to make sure business continuity.

Inline Deduplication

Block-level function that checks the block similarity of data and auto remove of the redundant data object to reduce the usage of storage capacity.

Learn More
Compression

Reducing data for your storage, helping ITs to reduce the amount of storage you need to purchase and maintain.

Auto-tiering

Demanding workloads of your business applications could be dramatically reduced and the performance increased.

Learn More
Thin provision

Let various services and applications use the same storage space without limiting how much of the quota can be used by each.

Related Solutions
Storage Solutions
Storage Solutions
Storage Solutions
Application Note
Explore More

Related Solutions

Storage Solutions
Storage Solutions
Storage Solutions
Storage Solutions
Storage Solutions
Explore More

What are You Waiting for?

Contact Us for More Details