Yes, Antares can be used to store primary or secondary copies of your data. Given the significant price and performance advantages that Antares provides over Amazon S3, there are advantages to using Antares for all data sets. However, Antares recognizes that given the incumbent nature of Amazon S3, some organizations may wish to continuing using Amazon S3 for their primary data set storage. In this scenario, Antares provides an inexpensive and highly durable storage repository for a secondary copy of your data.

Yes. The versioning feature with a cloud storage service offers an additional level of protection by providing a means of recovery when customers accidentally overwrite or delete objects. This allows you to easily recover from unintended user actions and application failures. You can also use versioning for data retention and archiving.The Antares versioning feature allows you to preserve, retrieve, and restore every version of every object stored in a Antares bucket. Once you enable versioning for a bucket, Antares preserves existing objects anytime you perform a PUT, POST, COPY, or DELETE operation on them. By default, GET requests will retrieve the most recently written version. Older versions of an overwritten or deleted object can be retrieved by specifying a version in the request.

Antares, with partner Wasabi hot Cloud Storage, addresses ITAR (International Traffic in Arms Regulations) / EAR (Export Administration Regulations) data compliance by providing customers with the option to store their data in US data centers managed by US persons on US soil. In addition, Antares, with partner Wasabi, complies with these important requirements for handling ITAR/EAR data:

Maintains an information security policy
Builds and maintains a secure network by installing and maintaining firewall configuration to protect data and avoiding the use of vendor-supplied passwords and other security defaults
Assigns a unique ID to each person with computer access
Regularly tests security systems and processes
Protects sensitive data with encryption
Regularly monitors and tests networks
Implements strong access control measures
Tracks and monitors all access to network resources and sensitive data
Maintains a vulnerability management program
Implement measures to prevent the loss of ITAR-controlled data.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed scelerisque, massa a bibendum ultricies sollicitudin, libero tellus finibus urna, eget aliquet diam nibh sed magna. Pellentesque lectus sodales urna. Sed non pulvinar libero.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed scelerisque, massa a bibendum ultricies sollicitudin, libero tellus finibus urna, eget aliquet diam nibh sed magna. Pellentesque lectus sodales urna. Sed non pulvinar libero.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed scelerisque, massa a bibendum ultricies sollicitudin, libero tellus finibus urna, eget aliquet diam nibh sed magna. Pellentesque lectus sodales urna. Sed non pulvinar libero.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed scelerisque, massa a bibendum ultricies sollicitudin, libero tellus finibus urna, eget aliquet diam nibh sed magna. Pellentesque lectus sodales urna. Sed non pulvinar libero.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed scelerisque, massa a bibendum ultricies sollicitudin, libero tellus finibus urna, eget aliquet diam nibh sed magna. Pellentesque lectus sodales urna. Sed non pulvinar libero.