At the core of Katalyst’s business is the desire to make subsurface data easier to access and utilize for oil and gas companies. As your seismic data management partner, Katalyst stores and curates your metadata through our D-mass storage system, providing a “virtual” storage solution that is always accessible in a secure private cloud environment. Clients access their seismic data through Katalyst’s iGlass PPDM database, a web-based ESRI map which makes finding data a simple and user-friendly experience. Whether you’re downloading your data locally, or sending it to third-party, iGlass offers the most efficient process in the industry.
As the first digital content managers to implement the PPDM 3.8 data model for seismic, subsurface and well information, Katalyst integrates innovative technology throughout our services to provide end-to-end content management and seismic storage solutions. With our private Tier 2 data centers and highly secure databases, we provide clients peace of mind in that their seismic resources are protected and accessible.
Katalyst is constantly evaluating its security architecture in an effort to provide the highest level of privacy and safety for our customers. Because there are important security issues associated with electronic transactions, strict internal procedures are in place within Katalyst to control our online services –from training employees, to confirming customer data transmissions, to prevent service interruptions. We safeguard information according to industry security standards and procedures, and we continually assess new technology for protecting information.
Your data is stored on Katalyst’s network and access to that network is strictly controlled by state-of-the-art firewall technology. Strict intrusion detection and prevention policies are in force, protecting your data from outside threats. Information exchanged over the internet is encrypted.
We use advanced technologies to make iGlass every bit as secure as it is convenient. These technologies protect your information from end to end – from your computer to Katalyst’s systems and back. Katalyst uses several methods to ensure integrity of your sessions, including:
Katalyst uses a variety of technologies and techniques to secure its products and services. You can help control risks and enhance your security when conducting business online by taking some simple steps:
For more information on our data storage services, please contact us.