Next-generation transport technologies to move
your assets at maximum speed.

Do you need a better data transfer solution?

In the time it takes to read this sentence, Aspera can move a 250MB file from Cairo to Dubai

Learn More

About IBM Aspera

Today, businesses across industries are facing greater challenges moving large files and massive sets of data quickly and reliably between global sites, and teams failing to meet these challenges can limit an organization’s ability to meet critical business imperatives that yield increased revenues, reduced costs, improved customer service, and new or improved business models.

Big data movement can include virtually any number of use cases, such as quickly sending a patient’s genomic sequencing data to a medical expert across the world for critical analysis or securely uploading massive volumes of new video content to online media providers so subscribers have access to the latest movies, music and TV shows.

As the size and volume of data continue to explode and permeate more business processes and decisions, the speed that data moves over the WAN becomes more crucial.

However, most enterprise tools in use today cannot reliably and securely move large files and data volumes at high speed over global distances. This is due to the inherent limitations of the Internet’s underlying transfer technology called the Transmission Control Protocol (TCP).

With IBM Aspera, you get

Shorten your transfer times from hours to minutes

TIn the real-time digital world of business, organizations need to access and move large files and data between globally dispersed teams and systems in seconds and minutes, not hours or days.
To move a 100GB file over a 100Mb/s network internationally:² FTP software: 100+ hours Aspera: 2.5 hours
To move a 10GB file over a 1Gb/s line in the US:³ FTP software: 10-20 hours Aspera: 1 minute, 24 seconds
You can Calculate Estimate the gains of using Aspera versus TCP

Aspera provides a highdegree of reliability

with automatic resume and restart from the point of interruption. It enables users to predict transfer time, regardless of distance or network conditions.
IBM Aspera’s patented adaptive rate control ensures the right users obtain the right upload priority.
During periods of extreme network congestion, rate control ensures timely acquisition and distribution of high-priority assets.

Aspera transfers have complete, built-in security for data transfers

that use the standard open source OpenSSL toolkit. The OpenSSL cryptographic libraries and the standard Secure Shell (SSH2) are used unmodified to take full advantage of the standard.
The Aspera security model consists of the following features: Session encryption to establish a secure channel for exchanging a random per-session key for encryption.
Secure authentication of transfer endpoints.
Flexible data encryption.
Verification of each transmitted data block.
Session Encryption Each transfer job begins by establishing a secure encrypted session between the endpoints that use the SSHv2 Secure Shell. The session encryption key is negotiated between the client and server by using a host-specific RSA key. A new key is generated each time the SSH daemon starts up, is regenerated each hour, and is never stored on disk
Endpoint Authentication After the secure session channel is established, the transfer endpoints authenticate by using one of the secure authentication mechanisms in SSH interactive password or public-key .
Data Encryption Following SSH authentication, the FASP transfer session performs a three-way handshake. The remote endpoint generates a random AES-128/192/256-bit per-session key for data encryption, a random 128-bit key for computing an SHA2 checksum, and sends these keys to the initiator over the secure ssh channel. A new encryption and HMAC-SHA2 key is generated on each FASP transfer session, and the keys are never stored on disk.
Data Integrity Verification An SHA2 cryptographic hash function is applied to each encrypted datagram before transmission on the network.
The resulting message digest or checksum is appended to the secure datagram and verified at the receiver for data integrity (to prevent man-in-the-middle, replay, and UDP denial-of-service attacks).

Book a meeting with our SPECIALIST

Your message succesfully sent!
Opps! There is something wrong. Please try again