Mimetic Distributed File Storage Device

2018-03-30 17:12:37 admin 58

Mimetic Distributed File Storage Device

Mimetic Distributed File Storage Device


Mimetic Distributed File Storage Device

Introduction


Mimetic distributed file storage is one of the achievements of mimetic defense theory in the field of distributed storage. Its goal is to provide highly robust file storage services for applications such as enterprise applications, cloud computing, and big data processing. On the premise of integrity and availability, the issue of data security and privacy can be effectively solved. Mimetic file storage is the latest product that combines high performance and high security.


1.png

Type

22.png

33.png

Category

Metadata Server

Data Server

Model

NTS-6002

NTS-6004

CPU

Heterogeneous Node 1:INTEL XEON E5 2650 V4

Heterogeneous Node 2:ARM64 XGEN

INTEL XEON E5 2620 V4

Optional ARM64 XGEN

Memory Cache Space

512GB

64GB

Storage

4  480G SSD

24 3.5 inch SATA/SAS3 bays (up to 240T storage capacity)

Network Interface

Four GbE     Two 10GbE

Four GbE     Two 10GbE

Physical Form

2U Rack

4U Rack

Power

800W  1+1 Redundancy

1200W  1+1 Redundancy

Software System

Distributed Mimicry Secure Storage Metadata Management System V1.2

Distributed Mimicry Secure Storage Metadata Management System V1.2


Safety Features

Ø   Endogenous Safety

In the mimetic file storage, metadata nodes are constructed using Dynamic Heterogeneous Redundancy (DHR) architecture, and data nodes are deployed in a heterogeneous platform. By adopting the DHR architecture, the storage can not only bring high fault tolerance to the storage system, but also independently provide certain or indefinite threat defense capabilities, effectively solve uncertainties in the distributed storage domain based on unknown vulnerabilities, backdoors, Trojan horses or other threat security issues. This innovative storage architecture has endogenous security and can provide high security defense capabilities while ensuring the reliability and scalability of the storage system. Compared to the method of securing a storage system by attaching or stacking specialized security defense facilities, its endogenous nature of security has a better price/performance ratio in deployment.

  4.png

Ø  Threat Awareness

Traditional distributed storage systems need to introduce independent security protection measures to ensure data storage and read-write access security. Specific technologies include encryption authentication, virus detection, virus removal, Trojan removal, and intrusion detection. The endogenous security of the mimetic storage system is independent of the security technologies mentioned above. Therefore, traditional security technology can be used as a complementary measure to stabilize the mimic state storage defense effect, and can be merged to make the mimetic storage defense capability obtain super nonlinear improvement for greater safety gains.

Mimetic file storage has powerful threat awareness capabilities. Traditional security products such as firewalls and intrusion detection systems generally adopt a match detection mechanism, so they can only be aware of known threats. The threat-awareness of mimetic file storage is derived from the determination of the output of multiple parallel heterogeneous executables in the DHR architecture, which makes it effective not only for known threats, but also for uncertain threats.

5.png

Ø   Independent Security Gains

Traditional distributed storage systems need to introduce independent security protection measures to ensure data storage and read-write access security. Specific technologies include encryption authentication, virus detection, virus removal, Trojan removal, and intrusion detection. The endogenous security of the mimetic storage system is independent of the security technologies mentioned above. Therefore, the traditional security technology can be used as a complementary measure to stabilize the mimic state storage defense effect, and can be merged to make the mimetic storage defense capability obtain super nonlinear improvement for greater safety gains.

6.png


XML 地图