Goldilock has revolutionized the way data, devices and infrastructure are protected on networks by allowing you to physically connect and disconnect anything from anywhere, in seconds without using the internet to do so. Our unique, patented platform utilizes secure non-internet communications to keep your sensitive digital assets physically segregated from any network, while still having them accessible at a moment’s notice from anywhere on earth.
Goldilock's secure non-internet communications allow for immediate access to your assets whenever needed, combining the security of cold storage with the speed and flexibility of hot storage.
By enabling physical disconnection of your digital assets from the internet when not in use, Goldilock significantly reduces the attack surface and provides a higher level of protection for sensitive data and systems.
Goldilock's remote connectivity control and compatibility with any network outlet offer versatile options to protect a wide range of devices and networks, giving you the power to tailor your security solution to your specific needs.
Goldilock is a major advance in cyber security protection. Most cyber products on the market provide just an illusion of protection. They are, after all, connected to the same physical layer, but Goldilock offers a completely new approach to reducing the cyber-attack surface through complete physical isolation.
Any device with an IP address is visible and vulnerable to accidents and attackers, but Goldilock’s unique and patented technology physically segregates data, networks, and people from harm.Goldilock is a 12-port network appliance that is controlled remotely and offers complete network isolation functionality via out-of-band and non-IP based SMS commands.
Remotely connect or disconnect assets in seconds down to port level
Control via Non-IP
Protect anything from a single device to entire networks, SCADA and PLCs
Intuitive, flexible, and powerful User and Administration Interface with reporting
Easy deployment and zero training required to get started – no forklift upgrades
Plugs into any network outlet
Physically separate networks or servers (or users) from being visible to each other until required. Shield high risk networks or data that contain IP, PII, industrial control systems, create secure digital vaults, or protect cryptographic keys and wallets
Avoid ‘always-on’ access to the core networks and mitigate risks of indirect cyber-attacks. Time limit access by third party suppliers that are required to carry out work.
Control the business risk of having customer facing systems disrupted. Create a secure procedure between development, testing and production.
Permit authorised contractors and other 3rd parties’ access to agreed network services / segments for scheduled periods after which, assets can be automatically disconnected
A range of intuitive commands are available to users when sending commands to the appliance, these include examples such as;
Input: Enable port [1-12]
Input: Disable port [1-12]
Input: Status port [1-12]
All commands and challenge response words are case sensitive.
There are two roles, defined as follows;
The appliance will automatically power up once power is restored.
There are three configurable states each port defaults to upon power up:
1. Default to connected state: The airgap will physically connect networks
2. Default to disconnected state: The airgap will physically disconnect networks
3. Default to previously set state: Whichever was the last known state.
It is neither a Layer 1hub nor a Layer 2 switch, from a networking perspective it is the equivalent of a patch cable
If you're still in search of answers, we encourage you to explore our informative FAQ section.