|
PROPRIETARY TECHNOLOGY
TAG

Physically isolate components from networks dynamically.

THREAT LANDSCAPE

Common Attack Strategies

Worm Propagation

AUTOMATED PROPAGATION

Software vulnerabilities can be used to exponentially infect components of a network. WannaCry utilized the EternalBlue exploit for this.

Manual Intrusion

TARGETING VULNERABLE SYSTEMS ONE BY ONE

Sophisticated attackers can gradually probe a network for targets and advance further as time goes on.

Sleeper Agent

INTENTIONALLY DELAYED ATTACKS

A successful intrusion can deploy a dormant exploit that activates at a later time to defer digital forensics.

Enter Airgaps

Network components are only vulnerable to attacks when they're reachable by others. Airgaps can separate systems deemed especially impactful in a security breach scenario in order to protect them from illicit access. However, not all airgaps are created equal. Standard solutions separate components via software, like disabling a network driver. This is not a true air gap because the Connection Authority remains susceptible to zero-day vulnerabilities or permission escalation.

THE DISTINCTION

Presenting a True air gapped Technology™

The connection authority of competitor solutions is configured and controlled from a system within the network - i.e. in front of the air gap. True air gapped Technology™ places this mechanism behind the air gap, implying that as long as the separation persists, no outside force, regardless of its access, can reinstate the network connection.

Standard Air-Gaps

Connection Authority located in front of separation.

True Air-Gap

Connection authority located behind the separation.

KEY
  • A Connection Authority
  • B Behind Airgap
  • N Network
  • Airgap Mechanism
Others
True Airgap Technology

The Core Concept

NETWORK (INFRASTRUCTURE) BACKUPS (AIRGAPPED) CONTROL_UNIT IDLE TX

Security by Physical Isolation
Unreachable, fast, secure.

At the core of the True air gapped Technology™ sits the physical isolation. Instead of deactivating a driver or cutting power, we physically separate network connections. This eliminates the threat of zero-day exploits hijacking a logical security strategy and removes performance impacts caused by ponderous mechanisms. Furthermore, it is part of our design philosophy to never expose the connection authority to the outside. In the converse scenario, an attacker who controls a network at a privileged level could easily hijack an air gap mechanism and lift the separation to reach the systems protected behind the barrier.

  • Physical Isolation
  • Controlled from Within
  • Fast