goldilock

Goldilock has revolutionized the way data, devices and infrastructure are protected on networks by allowing you to physically connect and disconnect anything from anywhere, in seconds without using the internet to do so. Our unique, patented platform utilizes secure non-internet communications to keep your sensitive digital assets physically segregated from any network, while still having them accessible at a moment’s notice from anywhere on earth

Instant
Accessibility

Goldilock's secure non-internet communications allow for immediate access to your assets whenever needed, combining the security of cold storage with the speed and flexibility of hot storage.


Enhanced
Security

By enabling physical disconnection of your digital assets from the internet when not in use, Goldilock significantly reduces the attack surface and provides a higher level of protection for sensitive data and systems.


Customizable
Control

Goldilock's remote connectivity control and compatibility with any network outlet offer versatile options to protect a wide range of devices and networks, giving you the power to tailor your security solution to your specific needs.


Goldilock is a major advance in cyber security protection. Most cyber products on the market provide just an illusion of protection. They are, after all, connected to the same physical layer, but Goldilock offers a completely new approach to reducing the cyber-attack surface through complete physical isolation.

Any device with an IP address is visible and vulnerable to accidents and attackers, but Goldilock’s unique and patented technology physically segregates data, networks, and people from harm.Goldilock is a 12-port network appliance that is controlled remotely and offers complete network isolation functionality via out-of-band and non-IP based SMS commands.



Tech Specs

  • Form Factor: 1U Rackmount (19")
  • Interface: 12 x RJ45 port pairs at OSI Layer 1
  • Throughput: Up to 10Gbps per port pair
  • Management: Out-of-Band Management Interface via Web Browser (Built-in)
  • Remote Trigger: Via SMS with number filtering, 2FA/OTP authentication, granular port access
  • Interfaces: 1 x SIM slot, 2 x SMA Antenna connectors
  • Power: 110V to 240V AC @50/60Hz, ~11W average consumption
  • Operating Temperature: 0C to +60C
  • Compliance: CE, UKCA, CISPR 22/32, FCC Part 15B Class A

General use case

Ransomware Response & Recovery

  • Immediately and remotely disconnect networks under attack to stop spread.
  • Isolate back-ups from being compromised to aid faster recovery.

Internal Network/Data Segregation

Physically separate networks or servers (or users) from being visible to each other until required. Shield high risk networks or data that contain IP, PII, industrial control systems, create secure digital vaults, or protect cryptographic keys and wallets


Network Circuit-Breaker

  • Control any type of network in an emergency. React dynamically to network stresses and overloading.
  • Proactively isolate LAN / WAN segments to protect when no needed e.g, out of work hours

Control Untrusted Third-Party Networks

Avoid ‘always-on’ access to the core networks and mitigate risks of indirect cyber-attacks. Time limit access by third party suppliers that are required to carry out work.


DevOps Segregation

Control the business risk of having customer facing systems disrupted. Create a secure procedure between development, testing and production.


Timed 3rd Party Remote Access

Permit authorised contractors and other 3rd parties’ access to agreed network services / segments for scheduled periods after which, assets can be automatically disconnected