Physically isolate components from networks dynamically.
THREAT LANDSCAPE
Common Attack Strategies
Worm Propagation
AUTOMATED PROPAGATION
Software vulnerabilities can be used to exponentially infect components of a network. WannaCry utilized the EternalBlue exploit for this.
Manual Intrusion
TARGETING VULNERABLE SYSTEMS ONE BY ONE
Sophisticated attackers can gradually probe a network for targets and advance further as time goes on.
Sleeper Agent
INTENTIONALLY DELAYED ATTACKS
A successful intrusion can deploy a dormant exploit that activates at a later time to defer digital forensics.
Enter Airgaps
Network components are only vulnerable to attacks when they're reachable by others. Airgaps can separate systems deemed especially impactful in a security breach scenario in order to protect them from illicit access. However, not all airgaps are created equal. Standard solutions separate components via software, like disabling a network driver. This is not a true air gap because the Connection Authority remains susceptible to zero-day vulnerabilities or permission escalation.
THE DISTINCTION
Presenting a True air gapped Technology™
The connection authority of competitor solutions is configured and controlled from a system within the network - i.e. in front of the air gap. True air gapped Technology™ places this mechanism behind the air gap, implying that as long as the separation persists, no outside force, regardless of its access, can reinstate the network connection.
Standard Air-Gaps
Connection Authority located in front of separation.
True Air-Gap
Connection authority located behind the separation.
KEY
- A Connection Authority
- B Behind Airgap
- N Network
- Airgap Mechanism
The Core Concept
Security by Physical Isolation
Unreachable, fast, secure.
At the core of the True air gapped Technology™ sits the physical isolation. Instead of deactivating a driver or cutting power, we physically separate network connections. This eliminates the threat of zero-day exploits hijacking a logical security strategy and removes performance impacts caused by ponderous mechanisms. Furthermore, it is part of our design philosophy to never expose the connection authority to the outside. In the converse scenario, an attacker who controls a network at a privileged level could easily hijack an air gap mechanism and lift the separation to reach the systems protected behind the barrier.
- Physical Isolation
- Controlled from Within
- Fast