Vesta - Secure Storage and Analysis of Sensitive Data
Vesta - Secure storage and analysis of research data lets you store and analyze sensitive research data in a secure way. Vesta consists of two parts:
- Storage that uses the same technology as Datalagring, but with encryption on disk and more rigorous restrictions on how to access the data.
- Analysing capabilities where you have access to a virtual computer with a selection of software where you can analyze and process your data without ever leaving the secure environment.
A virtual computer is a computer software that behaves as if it were a real computer. You run software in the virtual computer in the same way as in your physical computer, and the software is unaware that it is run in another software and not directly in the computer. In this way several users can share a server, and for every user the experience is that they have the server to themselves.
How do I use Vesta?
You can use Vesta in your web browser or in a designated client software, VmWare Horizon Client. The client software can be installed from Software Center or the equivalent software portal in your computer. You import your research data to a storage area in Vesta and process them in your virtual computer. When your analysis is finished you can export your results for example to publish them in a paper or a report.
NOTE: Since August the USB key used for multi factor authentication will only work with the web browser Firefox. If you use the client software Horizon you must set Firefox as your default web browser to be able to log in. UIT is revising methods for multi factor authentication in order to support more web browsers in the future.
How do I get access to Vesta, and what does it cost?
Access to Vesta is ordered through IT Servicedesk. You will find more information in the service description on how to apply for access and the cost of the service.
Vesta is configured in such a way that you can copy and paste text and images from your work computer to your virtual computer, but not the other way around. The intention is to prevent you from copying sensitive data by mistake into a software on your work computer, where the data does not have the same level of protection as in Vesta