Spictera Focus


Cybersecurity involves protecting computer systems, networks, and data from unauthorized access, or damage. It encompasses measures such as encryption, firewalls, and anti-virus software to safeguard against cyber threats and ensure confidentiality, and availability of information.

Spictera focus is to protect information from

  • being altered without authorization
  • being accessed from unauthorized locations
  • information losses due to physical media damages

Data stored on Spictera Unified Storage is secured using WORM (Write Once Read Many) – techniques, which makes the storage immutable and safe from unauthorized changes. Any changes results in that a new version will be created of the object.

To prevent from information losses, one can have extra copies replicated to other locations, or off site vaulted media.

The information can be encrypted while in use using own private encryption keys, or at rest. All data is encrypted while in transit.

Accessing data requires node authorization as well as user priveleges. It is also possible to set Geographical (GEO) fences so that accessing data is only possible from a safe location, this can be done based on content, mime-type or path of file/object.

Space Efficient

Data can be reduced using various techniques.

  • Compression, is where repetitive data is reduced to avoid using too much data, such as removing whitespaces in text files.
  • De-duplication, is to avoid storing data that has already been stored
This can be controlled centrally using policies based on mime-type or path, used while in transit, and/or at rest.
Combining De-Duplication with Compression can reduce storage need by 75-99%


Replication is a technique to create extra copies of your data, to secure from media damages, and improves business continuity using disaster recovery techniques.

The replication can be used in combination with space efficient techniques to reduce bandwidth consumption as well as storage.

Continuous Data Protection

Backup as a Code, or integrated backups is an Agent-less technique where the backup of transactional data can be initiated immediately without any scheduling. This improves the Recovery Point Objectives (RPO) as it minimize the Data Loss following after an incident.


Filtering is a technique where administrator can create policies for what type of data is allowed to be stored, which media to use, binding retention and versioning policies, decide how many copies, and more.

Retention Policies

Retention policies is where one can decide the retention of the data. This is very flexible. One can set “no expiration” until a newer file replaces the file or the file is marked to be expired using rm/del command. If the last version of the file is marked being deleted, one can have other retention policies which can be useful; eg to say that keep last version for 1 year.

Versioning Policies

Version policies is where one can decide how many versions to keep of a file.


Tiering data is a technique where data can be moved to other media based on usage. The technique helps customers reducing the overall cost.


Spictera Unified Storage can create snapshots of your applications where the snapshot version of the volumes is stored on the storage offsite using space efficient data copy reading built in change block tracking journal in the Linux operating system..

The snapshot is immutable, and can be used as read only to browse data, or reverted to nearly instantly to same or new server on same or new location. T

This technique reduces the Restore Time Objectives, as well as the Backup Time Objectives.

It also help reducing the resource consumption, and saves money for business


Spictera Unified Storage is open and flexible to be adjusted for most cases. One does not require to learn how to use an agent, but instead one can select the tool of preferences and still having control of your data in a secure manner.


Spictera Unified Storage is designed to be easy to use, where users can access, browse and store data without a need for education. All data accessible via an  easy to use interface. Accessed as a file-system, object store, Virtual Tape Library.

Scroll to Top