goldilock
Instant
Accessibility
Goldilock's secure non-internet communications allow for immediate access to your assets whenever needed, combining the security of cold storage with the speed and flexibility of hot storage.
Enhanced
Security
By enabling physical disconnection of your digital assets from the internet when not in use, Goldilock significantly reduces the attack surface and provides a higher level of protection for sensitive data and systems.
Customizable
Control
Goldilock's remote connectivity control and compatibility with any network outlet offer versatile options to protect a wide range of devices and networks, giving you the power to tailor your security solution to your specific needs.
Goldilock is a major advance in cyber security protection. Most cyber products on the market provide just an illusion of protection. They are, after all, connected to the same physical layer, but Goldilock offers a completely new approach to reducing the cyber-attack surface through complete physical isolation.
Any device with an IP address is visible and vulnerable to accidents and attackers, but Goldilock’s unique and patented technology physically segregates data, networks, and people from harm.Goldilock is a 12-port network appliance that is controlled remotely and offers complete network isolation functionality via out-of-band and non-IP based SMS commands.
Tech Specs
- Form Factor: 1U Rackmount (19")
- Interface: 12 x RJ45 port pairs at OSI Layer 1
- Throughput: Up to 10Gbps per port pair
- Management: Out-of-Band Management Interface via Web Browser (Built-in)
- Remote Trigger: Via SMS with number filtering, 2FA/OTP authentication, granular port access
- Interfaces: 1 x SIM slot, 2 x SMA Antenna connectors
- Power: 110V to 240V AC @50/60Hz, ~11W average consumption
- Operating Temperature: 0C to +60C
- Compliance: CE, UKCA, CISPR 22/32, FCC Part 15B Class A
General use case
Ransomware Response & Recovery
- Immediately and remotely disconnect networks under attack to stop spread.
- Isolate back-ups from being compromised to aid faster recovery.
Internal Network/Data Segregation
Physically separate networks or servers (or users) from being visible to each other until required. Shield high risk networks or data that contain IP, PII, industrial control systems, create secure digital vaults, or protect cryptographic keys and wallets
Network Circuit-Breaker
- Control any type of network in an emergency. React dynamically to network stresses and overloading.
- Proactively isolate LAN / WAN segments to protect when no needed e.g, out of work hours
Control Untrusted Third-Party Networks
Avoid ‘always-on’ access to the core networks and mitigate risks of indirect cyber-attacks. Time limit access by third party suppliers that are required to carry out work.
DevOps Segregation
Control the business risk of having customer facing systems disrupted. Create a secure procedure between development, testing and production.
Timed 3rd Party Remote Access
Permit authorised contractors and other 3rd parties’ access to agreed network services / segments for scheduled periods after which, assets can be automatically disconnected