iCAS Technology

Security without compromise: Our patented Content Storage Container (CSC) technique bundles the archive data with the corresponding meta data in special archive containers. These are secured against manipulation and unauthorized deletion. Retention times required by law are managed flexibly by iCAS. Files that have reached the retention date and are not on legal hold can be securely deleted according to Department of Defense (DoD) guidelines.
All access to the iTernity server is recorded, so that the complete history for every CSC container can be recalled.

Uses Standard File System

Because iCAS accesses the standard file system, the application is completely independent from storage manufacturers and technologies. iCAS writes on NAS and SANs from any manufacturer. Even existing storage can be used for archiving. Since users can choose any kind of backup solution, existing processes and know-how can still be used. Hierarchical storage management (HSM) allows transferring data to tapes or other media.

Based on Industry Standards

iTernity’s approach is based on industry standards like CIFS, SHA512 and AES256 encryption, rather than proprietary technologies. The established Windows 2012 R2 and 2016 servers along with the .NET framework guarantee iCAS performance, stability and scalability in every environment. This offers the user peace of mind for the future. The iTernity archive solution can always be combined with any software and hardware components of third-party vendors. There are no dependencies on technological isolated solutions.

See how iCAS can replace your outdated archive silos like Dell/EMC Centera.

Encryption and Compression

An additional bonus is the optional encryption of data with AES-256 algorithms to meet further security and privacy requirements (e.g. PCI-DSS). The archive data can also be compressed by up to 50%. This results in better memory usage, reduces energy consumption, and helps you to save costs.

Highly Scalable

iCAS has no limits in its scalability – the archive size as well as the performance can be adjusted according to the user’s needs. It is also possible to set up redundant and highly available configurations, using MS Cluster Windows Server 2012 and others.

Access via Web Service API or File System Gateway

Diverse applications such as DMS or ECM systems can access the iCAS software through a slim web service API and archive data on the configured storage system this way.
As an alternative to the web service API, iCAS offers a file system gateway (iFSG – iTernity File System Gateway).

Certified Technology

iCAS has been audited and certified by KPMG. The financial auditing company has certified the legal conformity of iCAS for tamper-proof archiving of data, meeting all relevant statutory guidelines.

To download the KPMG software certificates please follow the link:

Link to KPMG certificate: Sofware certificate of iCAS
Link to KPMG certificate: Audit of the data protection functions of iCAS

Additionally iTernity engaged Cohasset Associates Inc. for an independent assessment to evaluate the capabilities of iCAS to meet the storage related and audit history-related requirements of SEC Rule 17a-4 and CFTC Rule 1.31.

To download the Cohasset assessment please click here.

To meet all legal requirements for compliant archiving of business-related data, the complete archiving process in the organization needs an integrated design and must be well documented.

iTernity iCAS solution overview


Comply with GDPR on the basis of a central archive storage platform


Syngenta ensures compliance with HPE and iTernity

More flexibility thanks to virtualization – iCAS on virtual servers.