Six-9s security with business continuity to match
Even if your network is breached, hackers can’t use the data they access. Leonovus’ patented algorithms to break archived data into individual software objects for storage — usually 25 objects, though this can be calibrated to your security requirements. Those objects are distributed across multiple storage nodes: even if one node is compromised, it does not contain the complete object set, rendering it unusable by attackers. Only your authorized users can reconstitute files, needing just a proportion of the total object set — e.g., 16 of 25 if that’s your configuration. This 25/16 algorithm delivers six-9s (99.9999%) of data recovery probability and business continuity.