A data server surrounded by lines of binary code from all sides, and a shield with a lock in front of it, representing data safety.

Safety

Take control of your data security: geo-distributed object storage with support for various encryption types and auto-encryption of data transfers.

Join for free!

Protect Your Data from Unauthorized Access

A hand with a lock and a shield on top of it showcasing protection from unauthorized access.

Tebi is designed to handle large amounts of data and while some of it may be public, such as static website content or publicly available files, it is still highly important to ensure that it is stored securely.


We implement access controls that restrict data access, use server side encryption, and secure network protocols (like HTTPS). You can rest assured your data is protected with Tebi from potential unauthorized access or tampering.

Data Encryption: Data-at-Rest

At Tebi, we understand that data security is a top priority for our customers. That's why we take every possible measure to ensure that your data is always protected, including never storing your encryption keys together with your data.

Server-Side Encryption

Tebi employs AES-256 encryption, which is a standard established by the U.S. National Institute of Standards and Technology, to protect your data at rest. Tebi employs AES-256 encryption, which is a standard established by the U.S. National Institute of Standards and Technology, to protect your data at rest.

Our system-generated encryption key (regular SSE - Server Side Encryption) or customer-provided and managed encryption key (SSE-C) options give you the flexibility to choose how you want to manage your encryption keys.

An encryption key right next to the data server.

Client-Side Encryption

Tebi can also store already encrypted data (CSE-C), which allows you to encrypt data on your side and transmit it to storage. This approach provides the most secure method of encryption, as Tebi does not possess any knowledge of the encryption key or algorithm used to encrypt the data. In this case you bear the responsibility of encrypting and decrypting your own data.

HTTPS, TLS

A computer screen with the word 'https' and a shield in front of it.

Tebi's HTTPS-secured object upload and download requests use TLS (Transport Layer Security) protocol to encrypt the data being transferred between the client and server. TLS is a cryptographic protocol that provides secure communication over the internet. It works by encrypting the data being transferred between the client and server, making it extremely difficult for unauthorized users to access or read the data.

To learn more about ACL and SSE see:

https://docs.tebi.io/intro/acl.html
A globe map with pins showing the locations of servers
Image of two databases with a blue pin in front of them An image of a database with a blue pin in front of them

Begin storing data closer to your global users today

A globe map with pins showing the locations of servers Image of two databases
Unlock the power of geo-distributed, S3-compatible, in-house built object storage.
Get in touch with Tebi
A white envelope with Tebi's logo on the outside and a letter inside
Message sent
Get in touch
Wrong email
We use cookies and other tracking technologies to improve your browsing experience on our site, show personalized content, analyze site traffic, and understand where our users come from. By browsing this site, you are agreeing to this.
I Agree