Centralized Product Archive

Delta-X™ Crypt

Serialized Data Storage system that offers industry-leading scalability, data availability, security, and performance.

Crypt / Benefits

Real-time inventory visibility

Delta-X™ Crypt is the compendium of all products registered in the Delta-X™ ecosystem. The Crypt provides full traceability to the individual product unit level by associating geospatial entries to the unique identifier, while cross-referencing with its intended route to defect potential theft and diversion.

Full traceability throughout value chain

Location-based digital footprint

Delta-X™ Crypt keeps track of every products movement and provides real-time visibility into inventory across internal and external locations, ultimately tying each product to a single customer.

With the Delta-X™ Crypt mobile app, you can also scan any individual product and retrieve their complete history such as its origin, lot number, manufactured data and location history.

Secure by design

The Crypt is designed in ways that prevent the most common vulnerabilities such as SQL injections and XSS attacks. The framework also prevents RPC access to private methods, making it harder to introduce exploitable vulnerabilities.

Features and
Benefits

API CONNECTOR

Seamlessly integrate with ERP, MES, EPCIS systems and major RDBMS such as SQL, MySQL, Postgres SQL and Oracle to eliminate duplication risk.

BACKUPS AND DISASTER RECOVERY

We actively monitor our daily backup and replicate them in multiples locations on different continents. You can also download manual backups of your live data at any time using the control panel.

PCI–DSS 2.0 COMPLIANT

Build customer confidence and one-up your competitors with uncompromised, bank-level security. All your data is stored in a dedicated Crypt, protected using AES-256 encryption, and communicated via SSL using 2048-bit certificates.

METICULOUS NETWORK DEFENSES

Our server is designed to withstand the largest DDoS attacks and divert the attack traffic before it disrupts our service. Firewall and intrusion prevention measures are in place to detect and block threats such as brute-force attacks.

Transform your business