Fingerprint’s Cloud Backup and Archive Services Built on Scality RING

Geo-distributed RING ensures that data is kept intact and reliably available to protect assets for the company’s business clients

Scality, leader in software solutions for distributed file and object storage and multi-cloud data control, announced today that Fingerprint Technologies, a “one-stop shop” for business technology customers, depends on Scality RING software-defined storage (SDS) as the underpinning for its backup and archive cloud services offerings.

Fingerprint Technologies is a company that fosters an environment of adventure and passion for the business, and developing innovative solutions for business IT is an underlying goal. Offering everything from broadband services to web development to infrastructure, it’s no surprise that ease of use and smooth integration with a variety of applications are important to the team there. They implemented their Scality RING across three sites to ensure data availability and integrity–even if one site goes down. “Customers rely on Fingerprint for lots of technology services,” said Christophe Vedel, Hosted Services Engineer at Fingerprint Technologies. “Scality RING is the underpinning of one of the most critical services of all: preserving their business-critical data. We count on Scality RING to meet our SLAs so that we can meet our customers’.”

Scality RING brings performance, reliability, availability and performance to multiple use cases and workloads. The RING stores hundreds of petabytes of content for our customers around the globe. Software-defined Scality RING object storage turns any standard x86 server into highly-expandable storage. It scales without limits and guarantees 100 percent availability—all while reducing cost by as much as 90 percent compared to legacy systems. Scality RING is deployed by more than 200 petabyte-scale customers around the world. It features native file protocols and high-fidelity AWS S3 API, data encryption, volume and bucket data protection, data-restorative versioning, extended location control for data sovereignty, and geo-replication for disaster recovery for customers requiring ironclad data protection.