What is Wasabi Fire and what types of workloads is it designed for?
Wasabi Fire is an all-NVMe storage solution engineered for demanding high-throughput, low-latency workloads, particularly those found in AI data pipelines. It is S3-compatible and features no fees for egress or API requests, aiming to optimize data flow for AI initiatives.
How does Covert Copy enhance data security beyond immutability?
Covert Copy introduces an innovative virtual air-gap, making data invisible to malicious actors. This feature acts as an impenetrable last line of defense, providing an additional layer of protection against cyber threats even beyond standard immutable storage.
What compliance certifications and standards does Wasabi adhere to for data centers and sensitive data like PHI?
Wasabi's data centers are SOC-2, ISO 27001, and PCI-DSS certified. For sensitive data such as Protected Health Information (PHI), Wasabi offers a dedicated healthcare cloud environment that is HIPAA-compliant, ensuring secure storage for medical records and imaging.
Can Wasabi integrate with existing on-premises storage solutions from vendors like Dell and IBM?
Yes, Wasabi has technology alliance partnerships with companies like Dell and IBM. These partnerships enable customers to extend on-premises storage into the cloud for data protection, long-term retention, or seamless hybrid workflows, and to manage hybrid cloud workloads efficiently.
How does Wasabi's pricing model compare to hyperscalers, especially concerning hidden fees for cyber resilience efforts?
Wasabi's pricing model is designed to be predictable and up to 80% less than hyperscalers, with no charges for egress, reads, writes, or API requests. This contrasts with hyperscalers, where fees for access, transport, and API requests can significantly increase the total cost of ownership, especially when performing data recovery or testing cyber resilience.
What specific security features does Wasabi offer to protect against ransomware and unauthorized data manipulation?
Wasabi provides cyber-resilient immutability, which prevents data from being altered or deleted once written, and Multi-User Authentication (MUA) for sensitive actions like bucket or account deletions, eliminating single-credential risk. Additionally, Covert Copy makes data invisible to attackers, offering an extra layer of defense.