Privacy and compliance
The blockchain network is private and you're in control of access and permissions in the network. Restrict who can run a node or read data from the blockchain to comply with any compliance requirements your enterprise has.
Private blockchain allows you to distribute nodes locally to reduce latency and improve performance. Dedicated nodes provide enough capacity to cover the processing needs of your blockchain network.
Having full control over the number of nodes gives you unlimited scalability options.
Easily deploy additional nodes if you expect high number of transactions. Scale the number of nodes in your network and improve processing time.
Your data is not public
Data stored in private blockchain is not public at any time. You're in control who can read and write to blockchain. Fine grained permissions, private network and access restrictions help you protect your private data.
Certificate Authority VerificationAccess and permissions can be managed through a certificate authority which issues certificates used for authentication. Certificate authority can issue, renew and revoke certificates from a centrally managed console.
Access Control LevelFine-grained permission management allows you to define access to individual operations such as reading, submitting transactions, signing transactions, etc. per account on the network.
Firewall ProtectionNodes can be protected by a firewall to restrict network access to the nodes. This improves security by limiting security threats on the network level.
Dedicated Server ResourcesPrivate blockchain provides the option to dedicate server resources for nodes. Server resources not shared with other processes improve performance of the network.
Disk EncryptionData stored on the nodes can be encrypted by advanced cryptographic algorhitms. Data encryption protects data on the disks in case of security incidents.
Centralized Configuration ManagementManage configuration of your nodes from a central place. Deploy configuration change in real time to all nodes in the network.
Regulated Data SecurityComply with any compliance requirements your organization may have in place by configuring the type of data to be stored on individual nodes in the network.
Two Factor AuthenticationProtect accounts in the network by a two factor authentication to reduce the risk of account theft or misuse by a bad actor.
Centralized LoggingKeep all logs centralized, discoverable and searchable for easier debugging and alerting in case of potential issues within the private blockchain network.