Take control of your data security: geo-distributed object storage with support for various encryption types and auto-encryption of data transfers.Join for free!
Protect Your Data from Unauthorized Access
Tebi is designed to handle large amounts of data and while some of it may be public, such as static website content or publicly available files, it is still highly important to ensure that it is stored securely.
We implement access controls that restrict data access, use server side encryption, and secure network protocols (like HTTPS). You can rest assured your data is protected with Tebi from potential unauthorized access or tampering.
Data Encryption: Data-at-Rest
At Tebi, we understand that data security is a top priority for our customers. That's why we take every possible measure to ensure that your data is always protected, including never storing your encryption keys together with your data.
Tebi employs AES-256 encryption, which is a standard established by the U.S. National Institute of Standards and Technology, to protect your data at rest. Tebi employs AES-256 encryption, which is a standard established by the U.S. National Institute of Standards and Technology, to protect your data at rest.
Our system-generated encryption key (regular SSE - Server Side Encryption) or customer-provided and managed encryption key (SSE-C) options give you the flexibility to choose how you want to manage your encryption keys.
Tebi can also store already encrypted data (CSE-C), which allows you to encrypt data on your side and transmit it to storage. This approach provides the most secure method of encryption, as Tebi does not possess any knowledge of the encryption key or algorithm used to encrypt the data. In this case you bear the responsibility of encrypting and decrypting your own data.
Tebi's HTTPS-secured object upload and download requests use TLS (Transport Layer Security) protocol to encrypt the data being transferred between the client and server. TLS is a cryptographic protocol that provides secure communication over the internet. It works by encrypting the data being transferred between the client and server, making it extremely difficult for unauthorized users to access or read the data.