Manage true physical segmentation, remotely, instantly and without using the internet. No VPN’s, no IPv6, no IPv4 - no packets to sniff and no appliances to be seen. “I would like to introduce you to an exciting new approach to protecting high value network assets - a physical "drawbridge" called Goldilock. If you need to protect crown jewel data, such as intellectual property or computing infrastructure, this is your solution…it uniquely achieves what no other solution can.” Gregory Akers, Advanced Security Research, CISCO. Find out why Britain’s GCHQ National Cyber Security Center, chose Goldilock. Dynamic Physical Network Segmentation (#DPNS) Goldilock is revolutionizing the way data and critical infrastructure are protected online. How? Our patented solution allows you to physically connect and disconnect anything from the internet, from anywhere, at anytime, without using the internet do do it - thus eliminating the internet as a threat vector. The Goldilock premise is that your data and systems should not be physically connected to the Internet when you’re not using them, but that they need to be available to you from anywhere, immediately. Goldilock's non-IP controlled Drawbridge technology applies the same principle and technology to network architecture - allowing network administrators, directors and other authorized individuals to instantaneously connect and disconnect devices, control systems and network zones for data isolation, mitigation of zero-day or ransomware incidents. Have total control of your data and infrastructure, save money and sleep better knowing Goldilock is at your fingertips.
-
Industry
-
Computer and Network Security
-
Company size
-
11-50 employees
-
Headquarters
-
London, England
-
Type
-
Privately Held
-
Founded
-
2020
-
Specialties
-
Data storage, Cyber Security, data centers, GDPR, HIPAA, Endpoint, Infrastructure, Airgap, Data Privacy, PKI Management, Root Certificat Authority, Crypto Custody Technology, Secure Backup, Cloud Infrastructure, Cloud Security, data security, Critical Infrastructure, Cyber Physical, DPNS, Operational Technologies, OT/IT, SCADA, Segmentation, Network Segmentation, Network Segregation, Segregation, Network Security, and Critical Infrastructure Security