• We protect your organization through the pandemic.

A system that gives you peace in mind.

Have you ever wondered what might happen if your business is compromised? How will your daily activities continue? How will your employees feel? What will it cost to repair? Let us not find out, but instead secure your organization before it happens.

Pioneering and deeply high-tech infrastructure.

Delta/NET is based on a pioneering and deeply high-tech infrastructure, which through decentralization and distribution enables full integrity, control, and security of the stored data. We help you deal with the most advanced and increasing number of cybercrime before it hits you.

Upload files

When you upload a file in Delta/NET, you do the same as you do if you use e.g. Dropbox, Google Drive, or similar. You upload the file either by dragging it into the system or via the file browser, and the system starts working. In this stage, the file also gets encrypted.

File-Sharding

During the upload process, the file is split using our proprietary file sharing component. In this step, the system “tears” your file into pieces which are then encrypted once more and which are then tagged with the unique ID, a so-called “hash”. The ID plays a significant role later in the process.

Distribution

When the file has passed upload, share, and has been encrypted, we come to the distribution stage. All small pieces of your file will be spread through our distribution component, out to various nodes in our high-tech network. The different pieces will be completely private and far apart in the network.

Sharding

The blockchain acts as a verification component in the network. It logs everything that happens during upload and download as well as pairing unique IDs together to ensure that only the file-owner or a person with the right authority can access the file.

Blockchain

The blockchain acts as a verification component in the network. It logs everything that happens during upload and download as well as pairing unique IDs together to ensure that only the file-owner or a person with the right authority can access the file.

Retrieving files

When you then have to download your file, click on “download” as usual. What the system does in the first step is to recall all the small pieces of the file that were split and distributed in the network during the file-sharding process using the blockchain.

Locating parent hash

The system then locates which parent hash is linked to your user and all unique IDs. This is to ensure that you are the right person and that you should have access to the stored file.

Packaging

In the last step, the system merges all the different small pieces and then creates a complete version that you as the owner/authorized person have the right to download. All these steps take place in less than a second. You do not even have time to notice it.

For investors or the curious

Latest news and press releases.

JS Security och representanter från riksdagen inleder dialog angående samarbete i regeringens nya satsning om nationellt cybersäkerhetscenter

Onsdag den 3/3-2021 hade JS Security Technologies Group AB (‘’JS Security’’) sitt första och inledande möte avseende ett långsiktigt samarbete tillsammans med riksdagsledamöterna Mikael Larsson (C) (‘’Mikael’’) och Niels Paarup-Petersen (C) (‘’Niels’’) med mål om att säkra Sveriges datahantering.

How blockchain is changing the world of data storage

The main reason to raise your data security is to ensure the safety of all the information you have and store. When it comes to your customers, ensuring their safety of data is the minimum the vast of them will expect for companies they invest money or time in.

The importance of secure data storage

Data is the heart of every business. Many companies take data for granted as being safe, stored far away on computers, and “difficult” to access. A thirst for information has become the core of every business. With that being said, information theft and cyber attacks are not a new threat to companies and their data storage.