How It Works

The Calamu Process

Calamu’s patented process ensures that data is always available to authorized users and applications, and completely valueless to everyone else.

How it Works

Calamu Protect™ can be deployed in the cloud or on-premises via API and supports Docker and Kubernetes. The platform works by processing data from server workloads and end-user workstations, protecting data while at-rest and in-motion. Data is automatically fragmented and scattered across multiple separate storage locations, creating a virtual environment known as a data harbor. Seamlessly and transparently, the data can then be automatically reassembled, or “reconstituted” by authorized users and applications.

Watch the Video

The Calamu process enables zero-trust, end-to-end protection that is unparalleled by legacy solutions.

Total Data Privacy

In a Calamu Protect data harbor, your data exists but doesn’t exist.

No storage location contains all the components necessary to reconstitute the data, making it near impossible for information to be exposed or compromised. While at-rest, information doesn’t exist in a single geography anywhere in the world, known as geo-fragmented storage. This greatly simplifies compliance with data privacy regulations.