Activate Your Digital Plan B
Deploy Chunk Works in your environment with confidence. Complete implementation guide for production-ready deployments.
“Reactive security ends here. Intelligent Secure by Design — it’s in our DNA.”
— Dennis Schouten, CEO, Chunk Works
The Program
Test IT, See IT, Believe IT, Trust IT & Fixed IT
This program is a direct response to increased complexity, the wave of ransomware attacks, and the strict requirements of new European legislation such as CRA, NIS2, EU AI Act, and DORA.
Is your IT team confident that your data is truly secure from attacks and what about the topic Sovereignty? With cyber threats on the rise, simply hoping for the best isn’t enough. On a daily basis we see in the news: New data leaks and ransomware attacks.
At Chunk Works, we’ve developed a solution that provides permanent data security and integrity. Our five-step program ensures a seamless and confident transition, giving you full control and peace of mind.
Step 1: Test IT
We start with a 30-day pilot. Chunk Works is integrated into your existing environment to secure your most critical data without disrupting daily operations.
Step 2: See IT
Watch in real-time on a dashboard as your data is encrypted, fragmented, and distributed across multiple, geographically separate locations for immediate security.
Step 3: Believe IT
We simulate an attack or outage. Your IT team will see firsthand that even with a breach, your fragmented data remains completely unreadable, and a swift recovery is possible.
Step 4: Trust IT
Once the pilot is successful and the value is proven, we move forward with full deployment planning, ensuring all requirements are met for permanent security.
Step 5: Fixed IT
The Chunk Works service is fully deployed for all your critical data. You can now operate with the assurance that your data’s integrity and sovereignty are permanently secured.
Deployment Scenarios
Scenario 1: Standard Azure Cloud Integration
Quick deployment with minimum complexity
Environment
Microsoft Azure (single region)
Challenge
Add Chunk Works security quickly, minimally, and compliantly without complex migration
Implementation
3 Chunk Works VMs within a single Azure region with quorum + parity at VM level
Scenario 2: High SLA Azure – High Availability
Enterprise-grade availability across multiple zones
Environment
Microsoft Azure distributed across multiple Availability Zones (AZs)
Challenge
Higher SLA and no Single Point of Failure (SPOF) allowed at security level
Implementation
Active-Active cluster across multiple AZs with automatic parity distribution
Scenario 3: On-Premise HA (Dual Data Centers)
Complete control with on-premise infrastructure
Environment
Two proprietary data centers connected via redundant low-latency connection
Challenge
High availability between DCs without replication or central key storage
Implementation
One cluster across both DCs with parity-aware distribution
Scenario 4: Hybrid HA (MS Azure & On-Premise)
Best of both worlds: cloud flexibility with on-premise control
Environment
Hybrid: applications in Azure, data partially on-premises or vice versa
Challenge
Complying with strict RTO/RPO requirements; loss of one environment must not affect data integrity
Implementation
One distributed Chunk Works cluster layer across both environments
The basis of the Chunk Works solution is the separation between application functionality and data sovereignty. Thanks to the use of multiple, hybrid encryption and an infrastructure-independent design, Chunk Works environments function as a secure data layer that guarantees data sovereignty, regardless of the underlying infrastructure.
This principle applies to all four scenarios.
Ready to Activate Your Plan B?
Our team is ready to help you design and deploy the perfect Chunk Works solution for your infrastructure.
