Taking too long? Close loading screen.
Image is not available
Scroll's Capabilities

In this section we will take a part each of Scroll's functions, how they work, and cover the business benefits each support.

In this section we will take a part each of Scroll's functions, how they work, and cover the business benefits each support.

In this section we will take a part each of Scroll's functions, how they work, and cover the business benefits each support.

Slider

A Blockchain for Business needed an upgrade; 

Scroll made it capable for a Blockchain-based platform to efficiently structure data under a permissioned and miner-free environment.
Whether you need a file system or to store and structure data packets from processed transactions, the Scroll Network can support your data-centric business needs.

Image is not available
Why you should not depend on the skyscraper Gatekeeper

Traditional data architectures are structured like a skyscraper that houses many apartments, where each door is without a lock and there is one doorman at the main entrance of the building.

Traditional data architectures are structured like a skyscraper that houses many apartments, where each door is without a lock and there is one doorman at the main entrance of the building.

Traditional data architectures are structured like a skyscraper that houses many apartments, where each door is without a lock and there is one doorman at the main entrance of the building.

Image is not available

This arrangement is how cloud-hosting data storage providers silo data, which is protected by one central authority and accessed from one central data store. A centralized server has a Single Point of Failure (SPOF), which can lead to data loss and reduced availability. This is why a common problem with traditional data maintenance is plaintext data stored in unencrypted access points.

This arrangement is how cloud-hosting data storage providers silo data, which is protected by one central authority and accessed from one central data store. A centralized server has a Single Point of Failure (SPOF), which can lead to data loss and reduced availability. This is why a common problem with traditional data maintenance is plaintext data stored in unencrypted access points.

This arrangement is how cloud-hosting data storage providers silo data, which is protected by one central authority and accessed from one central data store. A centralized server has a Single Point of Failure (SPOF), which can lead to data loss and reduced availability. This is why a common problem with traditional data maintenance is plaintext data stored in unencrypted access points.

Image is not available

Once breached, it is a fire sale for already unprotected data. Traditional server infrastructures also experience downtime during period of increasing scalability.

Once breached, it is a fire sale for already unprotected data. Traditional server infrastructures also experience downtime during period of increasing scalability.

Once breached, it is a fire sale for already unprotected data. Traditional server infrastructures also experience downtime during period of increasing scalability.

Image is not available

The servers are hardware-based, which means scaling both horizontally or vertically is costly and time-exhaustive due to the downtime resulting from the "renovation".

The servers are hardware-based, which means scaling both horizontally or vertically is costly and time-exhaustive due to the downtime resulting from the "renovation".

The servers are hardware-based, which means scaling both horizontally or vertically is costly and time-exhaustive due to the downtime resulting from the "renovation".

previous arrow
next arrow
Slider

Set up an entity specific blockchain

Scroll makes the migration to Blockchain easy, making sure your business can maintain your own Scroll Network domain with our intuitive platform registry, set-up and usage. The Scroll Network is simple to set up. A product key is received through the DAPP business portal, so each client can download their own instance of their Scroll Network domain. The product key and other credentials are then inputted to the Scroll command prompt. The Scroll team works with each of our clients during the Scroll Network Domain design and onboarding process to further facilitate this process.

Set granular permissions to dissolve insider threats

Unique configuration management through a granular permission model exists in the Scroll Network to prevent excessive allocation of privileges, which is a main culprit behind data breaches. Once registry information is confirmed by the Scroll blockchain, an admin user runs through the identity management module (AUIMM) to generate unique user accounts with pre-packaged roles.  A company-specific approved list of privileges can be removed or applied to the existing preset roles at this time. Contact us to work with a Scroll implementation agent to design your unique Scroll Network domain and its privileges!

Store and Access Data

Logging in to the Scroll Network domain initiates the synchronization of user-permissible data. Data is seamlessly synced during log-in. Once logged in, data can be pushed, pulled, structured, or queried. This is unlike traditional data infrastructures in that each user has access to his/her own copy of the synced data store associated with the timestamp of the request made. This allows for a more personalized approach to data without the overhead. A Scroll domain can also act as a data layer in your data pipeline. Contact the Scroll development team to discuss integration of Scroll technology with your existing data models!

Generate Security Profiles

All user activity is recorded in the Scroll Network domain. Security profiles are generated to monitor for suspicious behavior.  Any behavior deemed suspicious activates the Automatic Identity Management Risk response. Any user considered a threat is temporarily an inactive node and has all privileges revoked.

Store data securely

Each call to a Scroll Network Domain is validated by the Hypernode Protocol. This means each piece of data stored on a given Scroll Network Domain has encryption applied in which each request made by the call is validated by all active nodes of the same node type whom hold the majority presence in the network. The request is confirmed when two conditions are met:

  • User has the privilege to perform action (insert, download, modify, etc.)
  • User is an active node

Sustain ideal uptime on a budget with Scroll's load balancer

The Scroll Network is made up of distributed nodes and simulated nodes. Distributed nodes represent end users, while simulated nodes are tacked onto the Scroll Network domain to support elasticity in the network, thus ensuring ideal uptime. Within the Scroll Network, data is always connected to the active users. Each user has their own copy of user- specific permissible data, thus supporting high performance at reduced rates competitive with traditional data management systems. To receive a demonstration and calculate your savings, contact Scroll today!

Archives, backups, and more

Unlike typical Blockchain networks, Scroll can set certain transactions as mutable. However, some data may need to be moved to a side chain or deleted entirely. Data is sharded to a designated additional Scroll Network Domain to support either archiving or deletion. The way in which the Scroll Network distributes data directly supports backing up all data stored. Rather than support calls to a centralized source, your data is constantly “backed up” to each active node.

Blockchain templated environment

As the Scroll team works with new clients and forks new, isolated Blockchain instances, the configurable Blockchain forks or variable nets will be packaged to provide templated Blockchain ecosystems to fit common needs. A user can participate in stitching a Net type, which allows a user to deploy a sub-modular forked Blockchain and enable or omit configurable net types.