TruAirgap™

Manufactured by Goldilock Secure Limited

Product Buying Options

Product Capacity: 200 per month

Minimum Order Quantity: 1

Additional Sales Information: Please contact sales@goldilock.com or call +44 7432 223558 directly.

Product Description

Goldilock’s TruAirgap™ is a simple yet revolutionary patented technology that creates a significant inconvenience layer for attackers who aim to disrupt and harm.

By physically isolating digital assets and networks from malicious adversaries, they simply cannot detect or send malicious software over thin air.  Control of network ports is a secure yet convenient method that does not use the internet that is out of sight of the attackers, reducing their ability to carry out their objectives.

Unlike existing network segregation techniques, TruAirgap™ is an intelligent hardware appliance that uniquely contains robotically controlled electromechanical relays to achieve total network disconnection. Only Goldilock's technology can be remotely controlled using out-of-band non-IP mechanisms, without using the internet, such as SMS.

There are a huge number of applications for the airgap solution, and these can be split into two categories:

Disconnected mode

Networks are physically severed until an authenticated user remotely controls the reconnection using SMS.  This is the same as someone holding a network cable and plugging it when they receive a command.

Connected mode

The network is connected until an authenticated user needs to disconnect the network connection using SMS.  This is the same as someone unplugging a network cable when they receive a command.

Use Cases

Access on Demand; Protection of critical networks/data

  • Reduce attackable surface from Ransomware
    Keep mission critical back-ups off-line and isolated, so they are not affected by ransomware outbreak, and shield sensitive data from being encrypted during attack.
  • Close the online 24/7 risk window for sensitive data and networks
    Bring application servers and data on-line quickly and simply, but only when there is a business need such as KYC, sensitive data and critical network maintenance.
  • Mitigate unapproved and code being deployed
    Isolate development & test networks from production networks to avoid profit disruption from erroneous or unapproved code being pushed live by DevOps.
  • Controlled access for 3rd party suppliers
    Reduce risks of 24/7 connections with less secure and more vulnerable third parties and suppliers through physical segmentation until connections and data transmissions are required.

Kill Switch; Network circuit breaker

  • Emergency action during Ransomware attack
    Take evasive manoeuvres to sever network connections and isolate devices quickly and simply to prevent a mass infection from a single remote office from spreading across the enterprise.
  • Manage supply chain risks
    Emergency disconnect when 3rd parties are compromised during a cyber-attack to prevent infection from being transmitted.
  • ‘Lights out’ assurance
    Build a process into everyday cyber security management to physically isolate and segment networks and data from being internet-facing outside normal working hours.

Applicable Product Categories

Manufacturer Profile

Goldilock Secure Limited

Technology / Security System Products

Click here

Share this page: