Critical Infrastructure & OT
Critical Infrastructure cyber attacks can cripple society. Most Operational Control Systems are network connected 24/7 presenting a significant attack vector.The rationale for this is often convenience for monitoring, updating and managing. Goldilock lets owners of critical infrastructure keep control systems completely disconnected until the second they are needed – or, alternatively, to disconnect them with a moment’s notice. No more costly ‘in-person’ visits to remote infrastructure for data collecting and management. Goldilock lets you connect/disconnect from wherever you are.
Defense & Security
Cybersecurity is now national security. Reducing the attack surface is paramount. With no reason to have internal operations exposed to the wider internet, Goldilock allows complete segregation, with selected, impenetrable and unhackable connection command pathways. Goldilock is the world’s most secure solution for isolating national security assets, keeping remotely managed weapons systems and platforms disconnected until needed or even allowing hyper secure exchange of information scenarios.
Cyber Kill Switch
In the event of zero-day day attacks and/or breaches, time is of the essence. In order to isolate assets, prevent lateral movement and ensure network integrity the last resort is often complete disconnection. For organizations this can mean hours in not days of physically gaining access to offices, data centres and even geographical locations. This is not only impractical, but horribly expensive. Goldilock is layer 1 and completely infrastructure agnostic. You can deploy it quickly and easily throughout to provide strategic isolation or overall ‘kill switches’.
Custody Providers
Are you responsible for the valuable digital assets of others? Do you want the security of cold storage with the speed, access and flexibility of hot storage? Sleep easier knowing those assets are completely physically disconnected from the internet when they’re not being used, but instantly available, only to you, and the process of control does not use the internet. You can also control access in a secure multi-approval scenario where multiple authorized parties must allow availability using the same hyper secure Goldilock system. Have total control and reduce vulnerability to near zero with minimal cost and effort.
Secure Digital Vault
Goldilock enables the secure, physically disconnected storage of sensitive information such as identification documentation, passwords, bank account and credit card information, validated KYC information, or private contracts. The Goldilock platform allows authorized users to securely approve sharing of their data and can act as an approval mechanism and escrow for transactions between multiple parties.
Securing Backups
Goldilock is a game-changing endpoint protection layer that works seamlessly with your existing endpoint security solutions to create an impenetrable defence against even the most sophisticated attacks. Providing physical separation as a defence against known and unknown attacks reduces your attack surface to zero and protects your data from deletion, exfiltration, ransomware, sabotage and more.
Healthcare
Nothing is more sensitive than healthcare data, and almost nothing is more essential than healthcare infrastructure; compromise of either can be catastrophic. By allowing the complete physical disconnection and segregation those assets, either in attack prevention, o response, Goldilock protects your devices, networks and facilities. Goldilock technology allows healthcare managers to have ultimate control over those assets. Compliance is important, but the trust of patients and society is even more important. Goldilock can help to ensure that trust is not misplaced.
Certificate Key Management
Hybrid cloud infrastructures and increasingly complex IT environments create a challenge for management of company certificates. Goldilock enables secret stores and HSMs to be disconnected from the Internet until access is required by an authorized user, providing both security and accessibility. This isolation layer allows secure storage of private keys for backup, escrow, or as a mailbox mechanism.
Data Regulation and Compliance
Governments worldwide are adapting to the sensitivity of data, with jurisdictions implementing strict regulations such as HIPAA, GDPR, CCPA, LGPD, POPI and others to enforce security and compliance. Fines can be eye-watering. However, most regulations offer ‘best effort’ scenarios, and there is no better effort than keeping sensitive data completely off the internet. Goldilock allows you to do this and yet have instant access. Alternatively Goldilock can act as a ‘kill switch’ – giving you the power to instantly respond to threats by disconnecting data, devices and networks from the internet.
Lights Out Solution
The vast majority of companies on earth keep regular working hours. Cyber security is confusing and difficult for many of them, but by virtue of their operating hours they can mitigate or eliminate a great deal of cyber threat by completely isolating their operations in non-working hours. Goldilock allows small and medium enterprises to sever their internal business networks from the internet after closing hours, while allowing management on-demand access for comptrolling, auditing and work-from-home activities when necessary.