True Multi-Tenant Management & Storage

Unmatched Security, Isolation and Control

Massive Scale and Performance

Request Information


Isolated data and private management. Deploy a multitude of applications and customers with isolation, visibility and control.


Automated security controls built into the core of storage. Protect against breach, disclosure and loss without being an expert.


On-demand discovery, provisioning, and configuration. Add capacity, performance and new classes of storage without disruption.


Total control of operation, function and management. Automate application delivery, support and operations, even if you’re not a developer.


Vendor, technology and architecture agnostic. Get consistent features across heterogeneous hardware and leverage existing investments.

Building a Cloud

Blockbridge provides a flexible, scalable and secure foundation for your cloud architecture. Our software-only solution delivers fine-grained multi-tenancy, comprehensive security and extensive management features. We also provide deep integration with OpenStack.

Automating IT

Blockbridge delivers complete control over storage operation and management with APIs and tools that are powerful and simple to use. Streamline service delivery and automate development processes with isolation and control. Deliver self-service storage for IT professionals, developers and DBAs.

Seeking Software-Defined

A fundamental shift in data center architecture and deployment is under way. The goal is to abstract virtual infrastructure from the supporting hardware to improve management and lower costs. Blockbridge software provides the scale, performance and features that you need while changing the economics of storage.

Securing Storage

Securing data and applications in modern IT infrastructure is an ongoing challenge: it’s so much more than just encrypted hard drives. Blockbridge builds security into the core of our storage. Our software automates complex security functions and enables new ways to protect against hackers, insiders and malware.

Feature Overview

    High Availability Clustering
    IOPS Quality of Service
    ISCSI Asynchronous Event Notification
    Networking – Data & Control Isolation
    Networking – Redundant Interfaces
    Networking – VLAN Tagging
    Non-Disruptive Add, Remove, Destage
    Quotas, Hard Limits, Soft Limits
    Replication – Cascades
    Replication – Sync, Ordered, Async
    SCSI – Multi-Initiator LUNs
    SCSI – Persistent Reservations
    SCSI – Removable Device Emulation
    SCSI/VAAI – 3rd Party Copy
    SCSI/VAAI – Assisted Zeroing
    SCSI/VAAI – Atomic Test And Set
    Snapshots & Clones
    Thin Provisioning
    Automated Firewall
    Automatic Secure Erase
    Block Level Authenticity Verification
    Block Level Integrity Verification
    Block Level Ownership Verification
    Encrypted Configuration
    Encrypted Data
    Encrypted In-Memory Cache
    Encrypted Metadata
    Encrypted Transports – TLS, IPSEC
    Keys – Automatic Backup
    Keys – Automatic Generation
    Keys – Inline Delegation
    Keys – Per Virtual Disk & Clone
    Keys – Tenant Controllable
    Programmable Intrusion Detection
    Transient Secure Storage
    Transport – Access Control Policies
    Transport – Perfect Forward Secrecy
    VPN Direct To Storage
    API – ACID Semantics For Common Patterns
    API – Extensible User-Defined Metadata
    API – Native Event Driven Interface
    API – Native JSON Data Representation
    API – Openstack Cinder Adapter
    API – RESTful Interface Adapter
    Automated Node Installation
    Automatic Provisioning By Attribute
    Automatic Provisioning By Utilization
    Cross Platform GUI (Browser Based)
    Cross Platform Shell Tools
    High Availability Clustering
    Historical Event and Statistics Querying
    Metering and Chargeback Statistics
    Per-Tenant Private Management
    Per-Tenant Role-Based Management
    Per-Tenant Self-Service Storage
    Single Pane Of Glass (All Interfaces)
    API – Automatic Session Expiration
    API – Rate Limiting
    API – Revocable Authentication Tokens
    AUTH – Google Authenticator Support
    AUTH – Multi-Factor support
    AUTH – OpenStack Keystone Support
    AUTH – Yubikey Support
    Encrypted Configuration
    Encrypted Management Transports – TLS
    Per-Tenant Management Isolation
    Per-Tenant Role-Based Management
    Perfect Forward Secrecy for Transports
    Software Package Signing
    User Auditing
    Any Interconnect – Internal, DAS, SAN
    Any Technology – HDD, SSD, NVMe, NVDIMM
    Any Hardware – Virtual or Physical X86_64
    Automated Installation
    No Host Software Requirements
    No L2 Networking Requirements
    RHEL Package Based Installation
    Supports AWS, Google, Rackspace

What is Blockbridge?

Blockbridge is a complete storage software solution for the enterprise. Our software delivers fine-grained multi-tenant elastic block storage. We solve management, storage and security challenges for modern storage infrastructure.

What is Elastic Storage?

Elastic storage is a system or service that enables on-demand discovery, provisioning, configuration and reclamation of storage resources. It is an essential element of automated infrastructure and cloud deployments.

How is Blockbridge used?

Blockbridge is commonly deployed as elastic block storage for a cloud or service-oriented infrastructure. Customers also use our security and management capabilities for secure storage, disaster tolerance, self-healing systems and intrusion detection.

Blockbridge is Software?

Yes. Our software transforms commodity hardware into an elastic iSCSI storage service. We’ve built a tightly integrated software stack of segmentation and virtualization technologies specifically designed to address the management, storage and security challenges of elastic environments.

What about Hardware?

Blockbridge software operates on any x86_64 based platform (bare-metal or virtual). You can deploy any block based technology: spinners, ssd, nvme, nvdimm, internal storage, DAS, SAN, etc. You can leverage existing storage investments as well as mix technologies, capacities, and vendors.

Does it scale?

A single “network” scales to thousands of geographically distributed nodes. It’s easy to achieve massive capacity, IOPS and throughput. Most importantly, adding nodes does not scale the failure domain. In hyperscale environments, multiple networks may be unified to support tens of thousands of nodes under common management.

Software-Defined Storage?

Software-Defined Storage is basically the concept of utilizing software that delivers enterprise storage functionality on commodity hardware. This approach is compelling to many customers. Software-defined storage is one use case among many that Blockbridge is well-suited to enable within your environment.

Blockbridge is Multi-Tenant?

Yes. The Blockbridge architecture enables tenants to operate in shared physical infrastructure with dedicated resources and private management. We also deliver sophisticated security guarantees for tenant data, networking and management functions.

Secure Multi-Tenancy?

Secure multi-tenancy refers to features and guarantees that protect assets from harm (ie. loss, exposure, tampering, etc). It’s a collection of hundreds of implementation details. Key generation, delegation, secure deletion, auditing, role based management, and intrusion detection are core features, not an afterthought.