Cloud Storage built to secure the world’s data
Protect your enterprise’s most critical data assets with the full capabilities of the Wasabi storage infrastructure.
Wasabi Cloud Storage Pillars
Security is obviously always on our mind. Data security is such a high-value need because schools are being targeted for things like ransomware now more than ever. It's not really ‘if’ an attack happens anymore, it's ‘when.’
Kevin Warenda
Director of Information Technology Services at The Hotchkiss School
Advanced Account Security Protocols with MUA
Multi-User Authentication (MUA) is a first of it’s kind security feature in the cloud storage space. When enabled, this feature requires that multiple root users sign off on an account deletion. This prevents bad actors or malicious individuals who have gained control of the account to delete the entire account at will.
Top Security Features Breakdown
Object Lock
Wasabi Object Lock maintains a write once, read many (WORM) archiving structure that prevents data from being edited or deleted due to ransomware, bad actors, accidental deletions and other threats over a set period. Object Lock is the ultimate in data protection.
Replication
Take advantage of intracontinental cloud replication between storage locations, creating multiple copies of your files and enabling your organization to replicate or copy your data between Wasabi regions to protect against ransomware attacks, malicious data manipulation, natural disasters, or even accidental deletion. Automatic failover, if primary storage is offline, allows for optimized data access and reduced latency when accessing from different regions for seamless business continuity.
Multi-Factor Authentication & Single Sign-On
Accounts accessed through passwords can be easily compromised , leaving your organization’s data open to a host of threats. Multi-Factor Authentication (MFA) and Single Sign-On (SSO) tack on additional security measures to login credentials, stopping would-be hackers from wreaking havoc before they can even get in.
Encryption
The Wasabi Cloud Storage platform is encrypted at rest and in transmission. Wasabi supports the HTTPS protocol for encryption during transmission of data to and from Wasabi.
Wasabi supports Server-side encryption with customer-provided encryption keys (SSE-C) that allow you to set your own encryption keys. With the encryption key you provide as part of your request, Wasabi manages the encryption as it writes to disks and decryption when you access your objects. Therefore, you don’t need to maintain any code to perform data encryption and decryption. The only thing you do is manage the encryption keys you provide.
Vulnerability and Suspicious Activity Reporting
Spot a vulnerability?
Wasabi investigates all reported vulnerabilities. If you would like to report a vulnerability, please contact us at [email protected]. When you contact us, please include any supporting material that would help us understand the problem. We are happy to take any input from customers, but at this time, we do not offer a bug bounty program.
Find any suspicious activity?
If you believe that Wasabi storage resources are being used for questionable purposes (for example, a Wasabi storage bucket being used for suspicious activity), or if you have additional system security questions beyond what is available for reference in the Wasabi Knowledge Base, please contact us at [email protected] or for privacy related matters, please contact [email protected].
CONTACT SALES
What if you could store ALL of your data in the cloud affordably?
NOW YOU CAN. Wasabi is here to guide you through your migration to the enterprise cloud and to work with you to determine which cloud storage strategy is right for your organization.