You need a secure network.
We believe networks should be inherently secure.
Jentu turns the golden image (which contains your Operating System) into an application-driven streaming protocol. This is achieved by intelligent caching and carefully crafted bits which control a representation of the disk block to the endpoint in a Jentu network.
This means very little data traverses the wire and ensures network usage is low and intrusion detection is easier then ever before.
We believe that traversing packets should be made “simple but not simpler“, since most breaches target the endpoint or IoT device in search for a persistent vulnerability. In a Jentu world, there is little to exploit on end user devices since there is no endpoint storage. There’s no hard drive to hack.
“The best IO is the one you don’t have to do.” – Gene Amdahl
Jentu has adaptive storage, used in a uniquely clever way unlike anything offered by the virtualization platforms of the modern data centre. Our disaggregated approach is inherently secure and reaches very low latency with an elastic algorithm and replication.