The primary purpose of the FireBreak device is to isolate and keep intact the digital environment, from the network to the individual device.
The Goldilock FireBreak is a true link killer. It prevents cyber-attacks and, in the event of an attack, provides near-instantaneous physical disconnect, preventing data leakage and lateral movement of attackers or malware. Goldilock FireBreakcan reduce the attack surface by up to 100%, providing the highest level of protection for sensitive data and systems.
Goldilock's patented technology ensures that assets and networks remain secure, invisible and inaccessible to adversaries, connecting to the Internet only when needed or when truly physically isolated at a moment's notice. Using electromechanical relays to physically connect or disconnect network connections, it does not use any Internet protocol - IPv6 or IPv4, VPN or MAC addresses - for communication or control and management. Attackers are therefore unable to intercept data packets or identify the device's address to locate it on the network and disable it. Communication with the device is via SMS and multi-factor authentication, as well as a built-in secure browser and an out-of-band channel that is separate from the primary IP network.
Goldilock FireBreak devices are available in two versions with up to 4 or up to 12 network connections, supporting data transfer speeds of up to 10 GB/sec.
Goldilock offers a completely new approach to other cyber security solutions that operate at the same physical level as attackers. It reduces the attack surface by completely physically isolating networks and endpoints.
Any device with an IP address is visible and vulnerable to accidents and attackers, but Goldilock's unique and patented technology physically separates data, networks and people from harm. Goldilock devices have neither an IP address nor a MAC address, making them invisible on the network. They are remotely managed out-of-band, completely separate from other devices and bypass the organisation's network.
The Goldilock FireBreak opens up a wide range of use cases, from overcoming complex security challenges and mitigating risk, to strengthening digital defences and protecting against evolving cyber threats. Key applications include
Most critical infrastructure operational control systems are constantly connected to the network, which is a significant attack vector. Goldilock enables critical infrastructure owners to disconnect control systems from the network until they need them for operational monitoring and analysis. On the other hand, they can disconnect them as soon as they no longer need the connection to the system.
Cyber security has become part of a government's security activities. Goldilock enables complete separation of internal operations from the network, with selected command paths that are impenetrable and cannot be hacked. Goldilock devices are considered the world's most secure solutions for isolating national security assets, maintaining remotely managed weapon systems and platforms with on-demand connectivity, and implementing highly secure information sharing scenarios.
Goldilock FireBreak provides secure, physically segregated storage for sensitive data such as identification documents, passwords, bank account and credit card information, KYC data or confidential contracts. The Goldilock platform allows authorised users to securely authorise the sharing of their data and can act as an authorisation and depository for multi-party transactions.
Time is of the essence when dealing with zero-day attacks, intrusions or AI service shutdowns. To isolate assets, prevent lateral movement and ensure network integrity, the last resort is often to disconnect completely. Goldilock operates at, and is completely independent of, the first, physical layer of the OSI architecture. It can be quickly and easily deployed anywhere in the world, giving you the ability to strategically isolate or instantly disconnect your IT assets and services wherever they are located.
Goldilock changes the rules of the game for endpoint protection. It works seamlessly with the security solutions you already have in place to protect processing and storage capacity at primary and secondary sites, complementing them with bulletproof defences against even the most sophisticated attacks. By physically separating the endpoints where you store backup data from the network, the attack surface is reduced to zero when it comes to defending against known and unknown attacks. It also protects your data from deletion, theft, ransomware, sabotage and other malicious activities.
Digital asset custodians need cold storage that can be warmed up instantly and the data made available for use. Goldilock FireBreak physically separates IT assets, and therefore digital assets, from the network, allowing assets to be attached and digital content to be accessed, even in scenarios where multi-person approval is required. Goldilock's hyper-secure system provides complete control and reduces vulnerabilities to near-zero with minimal cost and effort.
Hybrid cloud infrastructures and increasingly complex IT environments present challenges for digital certificate management. With Goldilock, the secret stores and hardware security modules that generate and manage digital certificate keys can be isolated from the network until an authorised user requests access. Such an isolation layer also enables the secure implementation of private key back-up storage while acting as a secure mailbox mechanism.
Healthcare data and infrastructure are vital to people, and a compromise of either could be catastrophic. Goldilock protects the devices, networks and facilities where healthcare services are delivered by completely physically separating and segregating these assets. It enables healthcare providers and the administrators of their assets to both prevent and respond to attacks. It ensures compliance and risk management through complete control of assets, thereby increasing patient and public confidence in healthcare organisations.
Countries around the world are increasing their requirements to protect increasingly sensitive data. In the EU, the most well-known are the GDPR and the NIS2 and their national legal implementations. The strict requirements are backed up by very high penalties and, in the case of NIS 2, even the possibility of being banned from doing business. Most regulations provide for the implementation of "best efforts" scenarios. But is there anything better than an organisation removing sensitive data from the Internet completely? Goldilock provides instant cut-off and instant access to assets and data on demand. This enables an immediate response to threats by disconnecting data, devices and networks from the interconnected network, or by immediately restoring IT services after the threat has been stopped or the attack has been remediated.
In the vast majority of organisations, IT systems are only in use during normal working hours. Organisations can dramatically reduce their cyber security risks by simply turning off their business systems outside of working hours. Much like turning off the lights in an office. Goldilock enables organisations of all sizes to separate internal business networks from the Internet after hours, while still allowing selected users, such as management, to access business data as needed.
More infomation: https://goldilock.com/