top of page


At Eye2Eye, our online archiving services reduce the time and cost involved in capacity planning, storage management and provisioning.  Our online archive storage archives are designed for safe and secure long-term storage of data.
We use secure online archiving as a solution to archive active data. Since 80% of data is unstructured, including medical records, JPEGS and emails, as opposed to structured databases that data needs to be secured, decreasing storage bloat and also enabling regulator compliance. Additionally, hard disks are fast replacing optical media and tapes in all phases of data archiving. 

Assureon is an archive storage system that is ideal for primary storage optimization, regulatory and corporate compliance, and the secure, long-term retention of files. Assureon reduces the total storage architecture by as much as 66%, by migrating data from tier-1 primary storage to more cost-effective and efficient tier-2-managed storage archive.

By adding a layer of compliance that provides authorization, audit trails and unique protection against deletions or changes, Assureon protects the authenticity, access and integrity of files on a continuous basis, meeting or exceeding all regulatory compliance requirements. Continuous archiving replaces backup and eliminates the need to restore data, while built-in mirroring replaces expensive disk and tape backup. From images to emails, office files to other fixed content, Assureon's WORM capability, self-auditing, self-healing, replication and file fingerprinting provide you with a different kind of storage experience - and the kind of security you need to protect your active data.

   Assureon's Features:

  • File Fingerprinting: Fingerprints using both MD5 and SHA1 hash of content and metadata, insuring history and contents cannot be altered after the fact.

  • File Redundancy: Makes two copies of the file and its fingerprint are stored in a separate RAID disk set either in the same system or a remote one.

  • File Serialization: Serial numbers are assigned to each individual file to ensure no files are changed, missing, or inappropriately added

  • Secure Time Stamp: Use of a global, redundant, secure time source using Stratum Level 1 hardware time sources to ensure accurate time stamp

  • Auto File Repair: Continually verifies against fingerprints and repair using copies and safeguarded by RAID disk arrays for days or even decades

  • Regulatory Compliance: Governmental and Corporate compliance of HIPAA, GLBA, Sarbanes-Oxley, Federal Rules of Civil Procedure (FRCP), SEC 17A-4 and PCI DSS

  • Secure Cloud Archive: Files are individually encrypted with its own AES-256 key to provide separation, security and reporting of data for each client, enabling easy import into billing systems

  • Storage Optimization: Archiving unstructured and infrequently used data frees up primary data and dramatically reducing the size, time and cost of the backup process

  • Data Longevity: Ensures adherence to guidelines for data retention, disposition, privacy, protection, chain of custody, litigation readiness and risk mitigation

bottom of page