With PetaSuite Protect you can manage genomic data security with fine-grain access, demonstrate compliance and enable deep-auditing of usage for regular genomic data files. Combined with the other PetaSuite capabilities of transparent compression and cloud access, it’s a specialized management tool for genomic data.
Secure your data
PetaSuite Protect prevents unauthorised access to genomic data by applying FIPS 140-2 compliant AES-256 regional encryption. Multi level granular access permissions control who has access to any given file, or part of a file. Users with appropriate access rights can control permissions through the PetaSuite Protect Management Server and can grant or revoke access in realtime.
Audit data use
Via the PetaSuite Protect Management Server users who have appropriate permissions can grant access on a granular basis to people within their organization, and outside. Once access has been granted and the data made available, the cryptographic ledger also records searchable information relating to how the data is accessed and used.
To be compliant with the relevant regulations, holders of genomic data must implement the necessary security protocols and demonstrate that those steps have been taken. PetaSuite Protect simplifies these tasks firstly by applying robust encryption to the data. Then, it creates records of who has access, and how that access is used, allowing data stewards to demonstrate that the appropriate measures have been taken.
Watch to learn why PetaSuite Protect is an award-winning solution for genomic data security, access control and auditing
Benefits of PetaSuite Protect
Easy to use
PetaSuite Protect Management Server is GUI-based and accessed via browser to enable easy set up and management of access to data.
Transparent cloud or on-premises integration so there is no need to change your existing tools or pipelines.
Won’t slow you down
On-the-fly client-side decryption and decompression provide quick scalable access to data across multiple
Manage user access
Unique keys for each region of each file mean users only see the data you allow them to.